Vulnerability Details CVE-2023-28803
An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 0.4%
CVSS Severity
CVSS v3 Score 5.9
Products affected by CVE-2023-28803
-
cpe:2.3:a:zscaler:client_connector:-
-
cpe:2.3:a:zscaler:client_connector:2.1
-
cpe:2.3:a:zscaler:client_connector:2.1.2
-
cpe:2.3:a:zscaler:client_connector:2.1.2.105
-
cpe:2.3:a:zscaler:client_connector:2.1.2.112
-
cpe:2.3:a:zscaler:client_connector:2.1.2.113
-
cpe:2.3:a:zscaler:client_connector:2.1.2.81
-
cpe:2.3:a:zscaler:client_connector:3.1
-
cpe:2.3:a:zscaler:client_connector:3.1.0
-
cpe:2.3:a:zscaler:client_connector:3.1.0.111
-
cpe:2.3:a:zscaler:client_connector:3.1.0.117
-
cpe:2.3:a:zscaler:client_connector:3.1.0.129
-
cpe:2.3:a:zscaler:client_connector:3.2
-
cpe:2.3:a:zscaler:client_connector:3.2.0.87
-
cpe:2.3:a:zscaler:client_connector:3.2.1.1
-
cpe:2.3:a:zscaler:client_connector:3.4
-
cpe:2.3:a:zscaler:client_connector:3.4.0.124
-
cpe:2.3:a:zscaler:client_connector:3.4.1.4
-
cpe:2.3:a:zscaler:client_connector:3.5
-
cpe:2.3:a:zscaler:client_connector:3.5.0.108
-
cpe:2.3:a:zscaler:client_connector:3.6
-
cpe:2.3:a:zscaler:client_connector:3.6.1
-
cpe:2.3:a:zscaler:client_connector:3.6.1.20
-
cpe:2.3:a:zscaler:client_connector:3.6.1.23
-
cpe:2.3:a:zscaler:client_connector:3.6.1.26
-
cpe:2.3:a:zscaler:client_connector:3.7
-
cpe:2.3:a:zscaler:client_connector:3.7.1