Vulnerability Description
An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zscaler | Client Connector | < 3.9 |
Related Weaknesses (CWE)
References
- https://help.zscaler.com/client-connector/client-connector-app-release-summary-2Release Notes
- https://help.zscaler.com/client-connector/client-connector-app-release-summary-2Release Notes
FAQ
What is CVE-2023-28803?
CVE-2023-28803 is a vulnerability with a CVSS score of 5.9 (MEDIUM). An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: b...
How severe is CVE-2023-28803?
CVE-2023-28803 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-28803?
Check the references section above for vendor advisories and patch information. Affected products include: Zscaler Client Connector.