Description
An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32438 | An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9. |
References
History
No history.
Status: PUBLISHED
Assigner: Zscaler
Published:
Updated: 2024-09-11T14:31:41.067Z
Reserved: 2023-03-23T18:29:15.803Z
Link: CVE-2023-28803
Updated: 2024-08-02T13:51:38.293Z
Status : Modified
Published: 2023-10-23T14:15:09.627
Modified: 2024-11-21T07:56:02.757
Link: CVE-2023-28803
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD