// For flags

CVE-2023-28807

Bypass of ZIA domain fronting detection module through evasion technique

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In Zscaler Internet Access (ZIA) a mismatch between Connect Host and Client Hello's Server Name Indication (SNI) enables attackers to evade network security controls by hiding their communications within legitimate traffic.

En Zscaler Internet Access (ZIA), una falta de coincidencia entre Connect Host y Client Hello's Server Name Indication (SNI) permite a los atacantes evadir los controles de seguridad de la red ocultando sus comunicaciones dentro del tráfico legítimo.

*Credits: Citi Red Team
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-03-23 CVE Reserved
  • 2024-01-31 CVE Published
  • 2024-02-10 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-295: Improper Certificate Validation
CAPEC
  • CAPEC-554: Functionality Bypass
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Zscaler
Search vendor "Zscaler"
Secure Internet And Saas Access
Search vendor "Zscaler" for product "Secure Internet And Saas Access"
< 6.2r.290
Search vendor "Zscaler" for product "Secure Internet And Saas Access" and version " < 6.2r.290"
-
Affected