// For flags

CVE-2023-28802

Disable Zscaler using machine tunnel restart

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An Improper Validation of Integrity Check Value in Zscaler Client Connector on Windows allows an authenticated user to disable ZIA/ZPA by interrupting the service restart from Zscaler Diagnostics. This issue affects Client Connector: before 4.2.0.149.

Una validación incorrecta del valor de verificación de integridad en Zscaler Client Connector en Windows permite a un usuario autenticado deshabilitar ZIA/ZPA interrumpiendo el reinicio del servicio desde Zscaler Diagnostics. Este problema afecta a Client Connector: anterior a 4.2.0.149.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
Low
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-03-23 CVE Reserved
  • 2023-11-21 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-10-21 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-354: Improper Validation of Integrity Check Value
CAPEC
  • CAPEC-554: Functionality Bypass
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Zscaler
Search vendor "Zscaler"
Client Connector
Search vendor "Zscaler" for product "Client Connector"
< 4.2.0.149
Search vendor "Zscaler" for product "Client Connector" and version " < 4.2.0.149"
windows
Affected