Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Zscaler — Vulnerabilities & Security Advisories 43

Browse all 43 CVE security advisories affecting Zscaler. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Zscaler operates as a cloud-native security provider, primarily delivering Zero Trust Network Access (ZTNA) and cloud firewall services to secure enterprise traffic. Despite its focus on protecting external threats, the platform has recorded 43 Common Vulnerabilities and Exposures (CVEs), revealing internal security gaps. Historically, these flaws predominantly involve remote code execution and cross-site scripting, with several instances allowing privilege escalation within administrative interfaces. These vulnerabilities suggest that while the external-facing architecture is robust, internal application logic has occasionally failed to enforce strict input validation or access controls. Notable incidents include unauthorized access attempts exploiting these weaknesses, highlighting the risks associated with complex cloud management consoles. The presence of such defects underscores the necessity for rigorous internal code auditing and continuous monitoring, even for vendors specializing in external threat mitigation and secure access solutions.

Found 36 results / 43Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2024-31127 MacOS Zscaler Client Connector Local Privilege Escalation — Client ConnectorCWE-346 7.3 High2025-06-04
CVE-2023-28806 Signature validation error in DLL allows disabling anti-tampering protection — Client ConnectorCWE-347 5.7 Medium2024-08-06
CVE-2024-23483 Local Privilege Escalation via lack of input validation — Client ConnectorCWE-20 7.0 High2024-08-06
CVE-2024-23460 Incorrect signature validation of package — Client ConnectorCWE-347 6.4 Medium2024-08-06
CVE-2024-23464 Zscaler bypass with administrative privileges on Windows — Client ConnectorCWE-281 7.2 High2024-08-06
CVE-2024-23458 Local Privilege Escalation on Zscaler Client Connector on Windows — Client ConnectorCWE-346 7.3 High2024-08-06
CVE-2024-23456 Signature validation issue leads to Anti-Tampering bypass — Client ConnectorCWE-347 7.8 High2024-08-06
CVE-2024-23462 ZCC Mac validinstaller file integrity check missing — Client ConnectorCWE-354 3.3 Low2024-05-02
CVE-2024-23461 ZCC macOS Upgrade ZIP Bomb DoS — Client ConnectorCWE-354 4.2 Medium2024-05-02
CVE-2024-23459 Multiple Arbitrary Creates/Overwrites by link following — Client ConnectorCWE-59 7.1 High2024-05-02
CVE-2023-41971 Windows ZCC Upgrade DoS And Privilege Escalation Through RPC Control — Client ConnectorCWE-59 5.3 Medium2024-05-02
CVE-2023-41970 Repair App local code execution with arbitrary privileges — Client ConnectorCWE-354 6.0 Medium2024-05-02
CVE-2023-28798 Out-of-bounds write to heap in pacparser — Client ConnectorCWE-122 6.5 Medium2024-05-02
CVE-2024-23480 Insecure MacOS code sign check fallback — Client ConnectorCWE-347 7.5 High2024-05-01
CVE-2024-23457 Anti-tampering can be disabled with uninstall password enforced — Client ConnectorCWE-269 7.8 High2024-05-01
CVE-2024-23463 Anti-Tampering bypass via Repair App functionality — Client ConnectorCWE-367 8.8 High2024-04-30
CVE-2024-23482 ZScalerService Local Privilege Escalation — Client ConnectorCWE-20 7.0 High2024-03-26
CVE-2023-41973 Lack of input santization on Zscaler Client Connector enables arbitrary code execution — Client ConnectorCWE-22 7.3 High2024-03-26
CVE-2023-41972 Revert password check incorrect type validation — Client ConnectorCWE-280 7.3 High2024-03-26
CVE-2023-41969 ZSATrayManager Arbitrary File Deletion — Client ConnectorCWE-61 7.3 High2024-03-26
CVE-2023-28802 Disable Zscaler using machine tunnel restart — Client ConnectorCWE-354 4.9 Medium2023-11-21
CVE-2023-28794 PAC Files Exposed to Internet Websites — Client ConnectorCWE-346 4.3 Medium2023-11-06
CVE-2023-28805 ZCC on Linux privilege escalation — Client ConnectorCWE-78 6.7 Medium2023-10-23
CVE-2023-28804 Linux ZCC allows unsigned updates, allowing elevated Code Execution — Client ConnectorCWE-347 8.2 High2023-10-23
CVE-2023-28803 Traffic being bypassed by ZCC by configuring synthetic IP range as local network — Client ConnectorCWE-290 5.9 Medium2023-10-23
CVE-2023-28797 LPE using arbitrary file delete with Symlinks — Client ConnectorCWE-59 6.3 Medium2023-10-23
CVE-2023-28796 IPC Bypass Through PLT Section in ELF — Client ConnectorCWE-94 7.1 High2023-10-23
CVE-2023-28795 Client IPC validation bypass — Client ConnectorCWE-346 7.8 High2023-10-23
CVE-2023-28793 Heap Based Buffer Overflow in Library — Client ConnectorCWE-94 7.8 High2023-10-23
CVE-2021-26738 Privilege Escalation for ZCC macOS via PATH Variable — Client ConnectorCWE-426 7.8 High2023-10-23

This page lists every published CVE security advisory associated with Zscaler. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.