4.2
CVE-2024-23461
- EPSS 0.05%
- Published 02.05.2024 13:23:06
- Last modified 21.11.2024 08:57:45
- Source cve@zscaler.com
- Teams watchlist Login
- Open Login
An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on MacOS during the upgrade process may allow a Local Execution of Code.This issue affects Client Connector on MacOS: before 3.4.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendorzscaler
≫
Product
client_connector
Default Statusunknown
Version <
3.4
Version
-
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.153 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
cve@zscaler.com | 4.2 | 0.5 | 3.6 |
CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
|
CWE-354 Improper Validation of Integrity Check Value
The product does not validate or incorrectly validates the integrity check values or "checksums" of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission.