CVE-2020-11633

9.8 CRITICAL

📋 TL;DR

A stack-based buffer overflow vulnerability in Zscaler Client Connector for Windows allows remote code execution with SYSTEM privileges when connecting to misconfigured TLS servers. This affects Windows users running Zscaler Client Connector versions prior to 2.1.2.74. An attacker could potentially gain complete control of affected systems.

💻 Affected Systems

Products:
  • Zscaler Client Connector
Versions: Versions prior to 2.1.2.74
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires connection to a misconfigured TLS server to trigger the overflow

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges leading to data theft, ransomware deployment, or persistent backdoor installation

🟠

Likely Case

Privilege escalation and remote code execution on vulnerable endpoints, enabling lateral movement within networks

🟢

If Mitigated

Limited impact if patched or if network controls prevent connections to malicious TLS servers

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires ability to control or redirect connections to malicious TLS servers

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.2.74 and later

Vendor Advisory: https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows&applicable_version=2.1.2.81

Restart Required: Yes

Instructions:

1. Download Zscaler Client Connector version 2.1.2.74 or later from Zscaler portal
2. Uninstall previous version
3. Install updated version
4. Restart system

🔧 Temporary Workarounds

Network Segmentation

all

Restrict outbound TLS connections to trusted servers only

TLS Inspection Bypass

windows

Configure Zscaler to bypass TLS inspection for untrusted servers

🧯 If You Can't Patch

  • Implement strict network controls to prevent connections to untrusted TLS servers
  • Monitor for unusual outbound TLS connections and investigate anomalies

🔍 How to Verify

Check if Vulnerable:

Check Zscaler Client Connector version in Windows Programs and Features or via 'About' in the client interface

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Zscaler*'} | Select-Object Name, Version

Verify Fix Applied:

Confirm version is 2.1.2.74 or higher and verify successful connection to Zscaler services

📡 Detection & Monitoring

Log Indicators:

  • Failed TLS handshake attempts
  • Unexpected process crashes in Zscaler client
  • Unusual network connections from Zscaler processes

Network Indicators:

  • Outbound TLS connections to non-standard ports
  • TLS connections to suspicious domains

SIEM Query:

source="windows" AND process="Zscaler*" AND (event_id=1000 OR event_id=1001) OR destination_port=443 AND source_process="Zscaler*"

🔗 References

📤 Share & Export