Learn about CVE-2023-28803, an authentication bypass vulnerability in Zscaler Client Connector before 3.9 on Windows. Published on October 23, 2023.
This CVE record was assigned by Zscaler and was published on October 23, 2023. It pertains to an authentication bypass vulnerability in Zscaler Client Connector affecting versions before 3.9.
Understanding CVE-2023-28803
This vulnerability allows for an authentication bypass by spoofing a device with a synthetic IP address in Zscaler Client Connector on Windows, potentially leading to a functionality bypass.
What is CVE-2023-28803?
The CVE-2023-28803 vulnerability involves an authentication bypass by spoofing a device with a synthetic IP address in Zscaler Client Connector on Windows, enabling a functionality bypass. This issue impacts versions of Client Connector before 3.9.
The Impact of CVE-2023-28803
The impact of CVE-2023-28803 is rated as medium severity, with a CVSS v3.1 base score of 5.9. It can compromise the confidentiality of information with high impact and has a low impact on integrity. The attack complexity is high, and the attack vector is through an adjacent network.
Technical Details of CVE-2023-28803
This section provides more specific technical details about the vulnerability.
Vulnerability Description
The vulnerability involves an authentication bypass by spoofing a device with a synthetic IP address in Zscaler Client Connector on Windows, leading to a functionality bypass.
Affected Systems and Versions
The vulnerability affects Zscaler Client Connector versions before 3.9 on Windows.
Exploitation Mechanism
Attackers can exploit this vulnerability by configuring a synthetic IP range as a local network, bypassing authentication mechanisms in Zscaler Client Connector.
Mitigation and Prevention
To address CVE-2023-28803 and enhance security measures, the following steps are recommended:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security updates and patches released by Zscaler for Client Connector. Regularly apply these updates to secure your systems against potential threats.