CVE-2023-41973
📋 TL;DR
This vulnerability in Zscaler Client Connector (ZSATray) allows path traversal attacks by improperly validating the 'previousInstallerName' parameter. Attackers could execute arbitrary code by manipulating this parameter to point to malicious executables. Affects Windows users running vulnerable versions of Zscaler Client Connector.
💻 Affected Systems
- Zscaler Client Connector (ZSATray)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with SYSTEM privileges, allowing complete system compromise and lateral movement within the network.
Likely Case
Local privilege escalation leading to unauthorized system access and potential credential theft.
If Mitigated
Limited impact with proper endpoint protection and least privilege principles in place.
🎯 Exploit Status
Requires ability to manipulate configuration parameters, likely through local access or social engineering.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.3.0.121 and later
Restart Required: Yes
Instructions:
1. Download Zscaler Client Connector version 4.3.0.121 or later from Zscaler portal. 2. Run the installer with administrative privileges. 3. Restart the system after installation completes.
🔧 Temporary Workarounds
Restrict configuration modification
windowsLimit write access to Zscaler Client Connector configuration files and directories
icacls "C:\Program Files\Zscaler\ZSATray\" /deny Users:(OI)(CI)W
🧯 If You Can't Patch
- Implement strict endpoint security controls to detect and prevent unauthorized process execution
- Apply principle of least privilege to all user accounts and service accounts
🔍 How to Verify
Check if Vulnerable:
Check Zscaler Client Connector version in Windows Programs and Features or via 'About' in the system tray icon
Check Version:
wmic product where "name like 'Zscaler%'" get version
Verify Fix Applied:
Confirm version is 4.3.0.121 or higher and verify no path traversal attempts in application logs
📡 Detection & Monitoring
Log Indicators:
- Unusual process execution from Zscaler directories
- Path traversal patterns in Zscaler logs
Network Indicators:
- Unexpected outbound connections from Zscaler processes
SIEM Query:
ProcessName="ZSATray.exe" AND (CommandLine CONTAINS "..\" OR CommandLine CONTAINS "../")
🔗 References
- https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Windows&applicable_version=4.3.0.121&deployment_date=2023-09-01&id=1463196
- https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Windows&applicable_version=4.3.0.121&deployment_date=2023-09-01&id=1463196