5.2
CVE-2025-54983
- EPSS 0.01%
- Veröffentlicht 12.11.2025 03:07:39
- Zuletzt bearbeitet 12.11.2025 16:19:12
- Quelle cve@zscaler.com
- CVE-Watchlists
- Unerledigt
A health check port on Zscaler Client Connector on Windows, versions 4.6 < 4.6.0.216 and 4.7 < 4.7.0.47, which under specific circumstances was not released after use, allowed traffic to potentially bypass ZCC forwarding controls.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerZscaler
≫
Produkt
Zscaler Client Connector
Default Statusunaffected
Version <
4.6.0.216
Version
4.6
Status
affected
Version <
4.7.0.47
Version
4.7
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.01% | 0.008 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| cve@zscaler.com | 5.2 | 2 | 2.7 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
|
CWE-772 Missing Release of Resource after Effective Lifetime
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.