Zscaler Client Connector
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Zscaler Client Connector.
By the Year
In 2026 there have been 0 vulnerabilities in Zscaler Client Connector. Last year, in 2025 Client Connector had 2 security vulnerabilities published. Right now, Client Connector is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 2 | 5.20 |
| 2024 | 10 | 7.41 |
| 2023 | 16 | 6.84 |
| 2022 | 0 | 0.00 |
| 2021 | 3 | 0.00 |
It may take a day or so for new Client Connector vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Zscaler Client Connector Security Vulnerabilities
Zscaler Client Connector 4.6/4.7 HC Port Bypass
CVE-2025-54983
5.2 - Medium
- November 12, 2025
A health check port on Zscaler Client Connector on Windows, versions 4.6 < 4.6.0.216 and 4.7 < 4.7.0.47, which under specific circumstances was not released after use, allowed traffic to potentially bypass ZCC forwarding controls.
Missing Release of Resource after Effective Lifetime
Privilege Escalation in Zscaler Client Connector <4.2 via Improper Library Verification
CVE-2024-31127
- June 04, 2025
An improper verification of a loaded library in Zscaler Client Connector on Mac < 4.2.0.241 may allow a local attacker to elevate their privileges.
I.S.V in Zscaler Client Connector (Win <4.2.0.190) Enables Tampering
CVE-2023-28806
6.5 - Medium
- August 06, 2024
An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering. This issue affects Client Connector on Windows <4.2.0.190.
Improper Verification of Cryptographic Signature
Zscaler Client Connector <4.2.0.190 Anti-tampering Disable Vulnerability
CVE-2024-23456
7.5 - High
- August 06, 2024
Anti-tampering can be disabled under certain conditions without signature validation. This affects Zscaler Client Connector <4.2.0.190 with anti-tampering enabled.
Improper Verification of Cryptographic Signature
Zscaler Client Connector <4.2.0.190 LPE via Autoupdater Log Copy
CVE-2024-23458
7.8 - High
- August 06, 2024
While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows <4.2.0.190.
Origin Validation Error
Zscaler Client Conn. macOS <4.2: Missing Installer Signature, Local Code Exec
CVE-2024-23460
7.8 - High
- August 06, 2024
The Zscaler Updater process does not validate the digital signature of the installer before execution, allowing arbitrary code to be locally executed. This affects Zscaler Client Connector on MacOS <4.2.
Improper Verification of Cryptographic Signature
Zscaler Client Connector Win <4.2.1: Admin PowerShell can disable ZIA
CVE-2024-23464
4.9 - Medium
- August 06, 2024
In certain cases, Zscaler Internet Access (ZIA) can be disabled by PowerShell commands with admin rights. This affects Zscaler Client Connector on Windows <4.2.1
OS Cmd Injection in Zscaler Client Connector <4.2 on macOS (CVE-2024-23483)
CVE-2024-23483
9.8 - Critical
- August 06, 2024
An Improper Input Validation vulnerability in Zscaler Client Connector on MacOS allows OS Command Injection. This issue affects Zscaler Client Connector on MacOS <4.2.
Shell injection
DHCP Client Leak via Classless Static Route (121)
CVE-2024-3661
7.6 - High
- May 06, 2024
DHCP can add routes to a clients routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
Missing Authentication for Critical Function
Integrity Check Validation Error in Zscaler CConnector <4.1.0.62 Windows
CVE-2023-41970
- May 02, 2024
An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on Windows during the Repair App functionality may allow Local Execution of Code.This issue affects Client Connector on Windows: before 4.1.0.62.
Link Resolution Logic flaw in Zscaler Client Connector Mac <3.7
CVE-2024-23459
- May 02, 2024
An Improper Link Resolution Before File Access ('Link Following') vulnerability in Zscaler Client Connector on Mac allows a system file to be overwritten.This issue affects Zscaler Client Connector on Mac : before 3.7.
Zscaler Client Connector 4.2 macOS arbitrary code exec via fallback
CVE-2024-23480
- May 01, 2024
A fallback mechanism in code sign checking on macOS may allow arbitrary code execution. This issue affects Zscaler Client Connector on MacOS prior to 4.2.
Integrity Check Val in Zscaler Client Connector <4.2.0.149 (Win)
CVE-2023-28802
4.9 - Medium
- November 21, 2023
An Improper Validation of Integrity Check Value in Zscaler Client Connector on Windows allows an authenticated user to disable ZIA/ZPA by interrupting the service restart from Zscaler Diagnostics. This issue affects Client Connector: before 4.2.0.149.
Improper Validation of Integrity Check Value
Privilege Abuse in Zscaler Client Connector <1.3.1.6 via Origin Validation Error
CVE-2023-28794
6.5 - Medium
- November 06, 2023
Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Privilege Abuse. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
Origin Validation Error
Zscaler Client Connector <3.6 Unquoted Search Path Exec (SYSTEM)
CVE-2021-26735
7.8 - High
- October 23, 2023
The Zscaler Client Connector Installer and Unsintallers for Windows prior to 3.6 had an unquoted search path vulnerability. A local adversary may be able to execute code with SYSTEM privileges.
Unquoted Search Path or Element
Zscaler Client Connector <3.4.0.124: Uninstall Junction Exploit Deletes Folders
CVE-2021-26734
5.5 - Medium
- October 23, 2023
Zscaler Client Connector Installer on Windows before version 3.4.0.124 improperly handled directory junctions during uninstallation. A local adversary may be able to delete folders in an elevated context.
Zscaler Client Connector Installer/Uninstaller PE via low-priv path (3.5)
CVE-2021-26736
7.8 - High
- October 23, 2023
Multiple vulnerabilities in the Zscaler Client Connector Installer and Uninstaller for Windows prior to 3.6 allowed execution of binaries from a low privileged path. A local adversary may be able to execute code with SYSTEM privileges.
Directory traversal
Zscaler Client Connector <3.6: RPC Race Condition Allows Local Shutdown
CVE-2021-26737
4.7 - Medium
- October 23, 2023
The Zscaler Client Connector for macOS prior to 3.6 did not sufficiently validate RPC clients. A local adversary without sufficient privileges may be able to shutdown the Zscaler tunnel by exploiting a race condition.
Origin Validation Error
Zscaler Client Connector macOS <3.7 unquoted PATH root exec
CVE-2021-26738
7.8 - High
- October 23, 2023
Zscaler Client Connector for macOS prior to 3.7 had an unquoted search path vulnerability via the PATH variable. A local adversary may be able to execute code with root privileges.
Untrusted Path
Zscaler Client Connector Linux Buffer Overflow in signelf pre-1.3.1.6
CVE-2023-28793
7.8 - High
- October 23, 2023
Buffer overflow vulnerability in the signelf library used by Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
Memory Corruption
Zscaler Client Connector 1.3.1.6: Origin Validation Error Allows Code Inclusion
CVE-2023-28795
7.8 - High
- October 23, 2023
Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Inclusion of Code in Existing Process. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
Origin Validation Error
Zscaler Client Connector <1.3.1.6: Improper Verification of Cryptographic Signature
CVE-2023-28796
7.8 - High
- October 23, 2023
Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
Improper Verification of Cryptographic Signature
Windows Zscaler Client Connector <4.1 PrivExecute via Config Edit
CVE-2023-28797
7.3 - High
- October 23, 2023
Zscaler Client Connector for Windows before 4.1 writes/deletes a configuration file inside specific folders on the disk. A malicious user can replace the folder and execute code as a privileged user.
insecure temporary file
Zscaler Client Connector Auth Bypass via IP Spoofing (Win) <3.9
CVE-2023-28803
6.5 - Medium
- October 23, 2023
An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.
Authentication Bypass by Spoofing
Zscaler Client Connector Linux: Signature Verification Flaw (1.4.0.105)
CVE-2023-28804
5.3 - Medium
- October 23, 2023
An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: before 1.4.0.105
Improper Verification of Cryptographic Signature
Privilege Escalation via Input Validation in Zscaler Client Connector <1.4.0.105
CVE-2023-28805
9.8 - Critical
- October 23, 2023
An Improper Input Validation vulnerability in Zscaler Client Connector on Linux allows Privilege Escalation. This issue affects Client Connector: before 1.4.0.105
Okta login flow URL param injection leaks auth tokens to malicious redirect
CVE-2023-28799
6.1 - Medium
- June 22, 2023
A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.
Open Redirect
XSS via unencoded redirect URL in local admin accounts
CVE-2023-28800
6.1 - Medium
- June 22, 2023
When using local accounts for administration, the redirect url parameter was not encoded correctly, allowing for an XSS attack providing admin login.
XSS
The Zscaler Client Connector for Windows prior to 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL
CVE-2020-11634
- July 15, 2021
The Zscaler Client Connector for Windows prior to 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context.
The Zscaler Client Connector prior to 2.1.2.150 did not quote the search path for services, which
CVE-2020-11632
- July 15, 2021
The Zscaler Client Connector prior to 2.1.2.150 did not quote the search path for services, which allows a local adversary to execute code with system privileges.
The Zscaler Client Connector for Windows prior to 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers
CVE-2020-11633
- July 15, 2021
The Zscaler Client Connector for Windows prior to 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers. An adversary would potentially have been able to execute arbitrary code with system privileges.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Zscaler Client Connector or by Zscaler? Click the Watch button to subscribe.