CVE-2023-41971

5.3 MEDIUM

📋 TL;DR

This vulnerability in Zscaler Client Connector on Windows allows attackers to overwrite system files through improper link resolution. It affects all Windows systems running Zscaler Client Connector versions before 3.7, potentially enabling local privilege escalation or system compromise.

💻 Affected Systems

Products:
  • Zscaler Client Connector
Versions: All versions before 3.7
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of Zscaler Client Connector. Requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM privileges, installs persistent malware, or bricks the operating system by overwriting critical system files.

🟠

Likely Case

Local user escalates privileges to install unauthorized software, access sensitive data, or maintain persistence on the compromised system.

🟢

If Mitigated

With proper user privilege restrictions and endpoint protection, impact limited to local file manipulation within user context.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this to escalate privileges and move laterally within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the Windows system. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.7 and later

Vendor Advisory: https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=windows&applicable_version=3.7

Restart Required: Yes

Instructions:

1. Download Zscaler Client Connector version 3.7 or later from the Zscaler portal. 2. Run the installer with administrative privileges. 3. Restart the system after installation completes.

🔧 Temporary Workarounds

Restrict local user privileges

windows

Limit standard user accounts to prevent local exploitation attempts

Enable Windows Defender Application Control

windows

Implement application whitelisting to prevent unauthorized file modifications

🧯 If You Can't Patch

  • Implement strict least-privilege access controls for all user accounts
  • Deploy endpoint detection and response (EDR) solutions to monitor for suspicious file modification attempts

🔍 How to Verify

Check if Vulnerable:

Check Zscaler Client Connector version in Windows Programs and Features or via 'About' in the Zscaler Client Connector interface

Check Version:

wmic product where name="Zscaler Client Connector" get version

Verify Fix Applied:

Confirm version is 3.7 or higher in Zscaler Client Connector settings

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file modification events in Windows Security logs
  • Zscaler Client Connector process creating or modifying system files

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

EventID=4663 OR EventID=4656 | where TargetObject contains "system32" OR TargetObject contains "windows" | where ProcessName contains "Zscaler"

🔗 References

📤 Share & Export