CVE-2020-11633
📋 TL;DR
A stack-based buffer overflow vulnerability in Zscaler Client Connector for Windows allows remote code execution with SYSTEM privileges when connecting to misconfigured TLS servers. This affects Windows users running Zscaler Client Connector versions prior to 2.1.2.74. An attacker could potentially gain complete control of affected systems.
💻 Affected Systems
- Zscaler Client Connector
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with SYSTEM privileges leading to data theft, ransomware deployment, or persistent backdoor installation
Likely Case
Privilege escalation and remote code execution on vulnerable endpoints, enabling lateral movement within networks
If Mitigated
Limited impact if patched or if network controls prevent connections to malicious TLS servers
🎯 Exploit Status
Exploitation requires ability to control or redirect connections to malicious TLS servers
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.1.2.74 and later
Vendor Advisory: https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows&applicable_version=2.1.2.81
Restart Required: Yes
Instructions:
1. Download Zscaler Client Connector version 2.1.2.74 or later from Zscaler portal
2. Uninstall previous version
3. Install updated version
4. Restart system
🔧 Temporary Workarounds
Network Segmentation
allRestrict outbound TLS connections to trusted servers only
TLS Inspection Bypass
windowsConfigure Zscaler to bypass TLS inspection for untrusted servers
🧯 If You Can't Patch
- Implement strict network controls to prevent connections to untrusted TLS servers
- Monitor for unusual outbound TLS connections and investigate anomalies
🔍 How to Verify
Check if Vulnerable:
Check Zscaler Client Connector version in Windows Programs and Features or via 'About' in the client interface
Check Version:
Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Zscaler*'} | Select-Object Name, Version
Verify Fix Applied:
Confirm version is 2.1.2.74 or higher and verify successful connection to Zscaler services
📡 Detection & Monitoring
Log Indicators:
- Failed TLS handshake attempts
- Unexpected process crashes in Zscaler client
- Unusual network connections from Zscaler processes
Network Indicators:
- Outbound TLS connections to non-standard ports
- TLS connections to suspicious domains
SIEM Query:
source="windows" AND process="Zscaler*" AND (event_id=1000 OR event_id=1001) OR destination_port=443 AND source_process="Zscaler*"