Anti-tampering protection of the Zscaler Client Connector can be bypassed under certain conditions when running the Repair App functionality. This affects Zscaler Client Connector on Windows prior to 4.2.1
References
| Link | Resource |
|---|---|
| https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023 | Vendor Advisory Release Notes |
| https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023 | Vendor Advisory Release Notes |
Configurations
History
02 Mar 2026, 19:37
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023 - Vendor Advisory, Release Notes | |
| First Time |
Zscaler client Connector
Zscaler |
|
| CPE | cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:* |
21 Nov 2024, 08:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023 - | |
| Summary |
|
30 Apr 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-04-30 17:15
Updated : 2026-03-02 19:37
NVD link : CVE-2024-23463
Mitre link : CVE-2024-23463
CVE.ORG link : CVE-2024-23463
JSON object : View
Products Affected
zscaler
- client_connector
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
