Vulnerability Description
The Zscaler Client Connector for macOS prior to 3.6 did not sufficiently validate RPC clients. A local adversary without sufficient privileges may be able to shutdown the Zscaler tunnel by exploiting a race condition.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zscaler | Client Connector | < 3.6 |
Related Weaknesses (CWE)
References
- https://help.zscaler.com/client-connector/client-connector-app-release-summary-2Release Notes
- https://help.zscaler.com/client-connector/client-connector-app-release-summary-2Release Notes
FAQ
What is CVE-2021-26737?
CVE-2021-26737 is a vulnerability with a CVSS score of 5.5 (MEDIUM). The Zscaler Client Connector for macOS prior to 3.6 did not sufficiently validate RPC clients. A local adversary without sufficient privileges may be able to shutdown the Zscaler tunnel by exploiting ...
How severe is CVE-2021-26737?
CVE-2021-26737 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-26737?
Check the references section above for vendor advisories and patch information. Affected products include: Zscaler Client Connector.