First published: Wed Jan 31 2024(Updated: )
In Zscaler Internet Access (ZIA) a mismatch between Connect Host and Client Hello's Server Name Indication (SNI) enables attackers to evade network security controls by hiding their communications within legitimate traffic.
Credit: cve@zscaler.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zscaler Secure Internet And Saas Access | <6.2r.290 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28807 is classified as a high severity vulnerability due to its potential to allow attackers to evade security controls.
To remediate CVE-2023-28807, ensure that you are using a version of Zscaler Internet Access above 6.2r.290 and properly configure the Connect Host and SNI settings.
CVE-2023-28807 can lead to unauthorized access and data exfiltration by hiding malicious traffic within legitimate communications.
CVE-2023-28807 affects Zscaler Secure Internet and SaaS Access versions up to but not including 6.2r.290.
Monitor your network traffic for unusual patterns that suggest legitimate traffic is being used to conceal malicious activities related to CVE-2023-28807.