First published: Tue Aug 06 2024(Updated: )
While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows <4.2.0.190.
Credit: cve@zscaler.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zscaler Client Connector for Windows | <4.2.0.190 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-23458 is high due to its potential for local privilege escalation.
To fix CVE-2024-23458, upgrade Zscaler Client Connector to version 4.2.0.190 or later.
CVE-2024-23458 affects Zscaler Client Connector on Windows versions prior to 4.2.0.190.
CVE-2024-23458 is a local privilege escalation vulnerability.
There is no public information indicating that CVE-2024-23458 is actively being exploited in the wild.