CVE-2024-23463

Anti-tampering protection of the Zscaler Client Connector can be bypassed under certain conditions when running the Repair App functionality. This affects Zscaler Client Connector on Windows prior to 4.2.1
Configurations

Configuration 1 (hide)

cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*

History

02 Mar 2026, 19:37

Type Values Removed Values Added
References () https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023 - () https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023 - Vendor Advisory, Release Notes
First Time Zscaler client Connector
Zscaler
CPE cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*

21 Nov 2024, 08:57

Type Values Removed Values Added
References () https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023 - () https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023 -
Summary
  • (es) La protección antimanipulación del Zscaler Client Connector se puede omitir bajo ciertas condiciones al ejecutar la funcionalidad de la aplicación de reparación. Esto afecta a Zscaler Client Connector en Windows anteriores a 4.2.1

30 Apr 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-30 17:15

Updated : 2026-03-02 19:37


NVD link : CVE-2024-23463

Mitre link : CVE-2024-23463

CVE.ORG link : CVE-2024-23463


JSON object : View

Products Affected

zscaler

  • client_connector
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition