First published: Thu Jul 15 2021(Updated: )
The Zscaler Client Connector for Windows prior to 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers. An adversary would potentially have been able to execute arbitrary code with system privileges.
Credit: cve@zscaler.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zscaler Client Connector for Windows | <2.1.2.81 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11633 is a vulnerability in the Zscaler Client Connector for Windows, allowing an attacker to execute arbitrary code with system privileges.
CVE-2020-11633 has a severity score of 9.8 out of 10, indicating a critical vulnerability.
CVE-2020-11633 exploits a stack-based buffer overflow in the Zscaler Client Connector for Windows when connecting to misconfigured TLS servers.
Zscaler Client Connector for Windows versions up to (excluding) 2.1.2.81 are affected by CVE-2020-11633.
To fix CVE-2020-11633, it is recommended to update Zscaler Client Connector for Windows to version 2.1.2.81 or higher.