CVE-2024-23459

7.1 HIGH

📋 TL;DR

This vulnerability allows an attacker to exploit improper link resolution in Zscaler Client Connector on macOS, enabling them to overwrite system files. This affects all macOS users running Zscaler Client Connector versions before 3.7. The issue stems from improper handling of symbolic links or shortcuts before file access operations.

💻 Affected Systems

Products:
  • Zscaler Client Connector
Versions: All versions before 3.7
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS installations of Zscaler Client Connector. Windows and other platforms are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could overwrite critical system files, potentially leading to system compromise, privilege escalation, or complete system takeover.

🟠

Likely Case

Local attackers could overwrite files to gain elevated privileges, install malware, or disrupt system functionality.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to local file manipulation within user context.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the system. No public exploit code has been identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.7

Vendor Advisory: https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=macos&applicable_version=3.7

Restart Required: Yes

Instructions:

1. Download Zscaler Client Connector version 3.7 or later from official Zscaler sources. 2. Install the update following standard macOS software installation procedures. 3. Restart the system to ensure all components are properly updated.

🔧 Temporary Workarounds

Restrict local access

all

Limit physical and remote local access to vulnerable systems to reduce attack surface.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can execute applications on affected systems.
  • Monitor for suspicious file modification activities using endpoint detection and response (EDR) tools.

🔍 How to Verify

Check if Vulnerable:

Check Zscaler Client Connector version in macOS System Preferences > Zscaler Client Connector > About. If version is below 3.7, system is vulnerable.

Check Version:

defaults read /Applications/Zscaler/Zscaler.app/Contents/Info.plist CFBundleShortVersionString

Verify Fix Applied:

After updating, verify version shows 3.7 or higher in the About section of Zscaler Client Connector.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file modification events in system logs
  • Zscaler process accessing unexpected system files

Network Indicators:

  • No specific network indicators as this is a local vulnerability

SIEM Query:

source="macos_system_logs" AND (process="Zscaler" OR process="zscaler") AND (event="file_modification" OR event="file_write") AND target_path CONTAINS "/System/"

🔗 References

📤 Share & Export