Lucene search

K
cvelistZscalerCVELIST:CVE-2023-28807
HistoryJan 31, 2024 - 7:16 p.m.

CVE-2023-28807 Bypass of ZIA domain fronting detection module through evasion technique

2024-01-3119:16:59
CWE-295
Zscaler
www.cve.org
3
cve-2023-28807
bypass
zscaler internet access
evasion technique
network security controls
sni
attackers
legitimate traffic

CVSS3

5.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

EPSS

0.001

Percentile

17.8%

In Zscaler Internet Access (ZIA) a mismatch between Connect Host and Client Hello’s Server Name Indication (SNI) enables attackers to evade network security controls by hiding their communications within legitimate traffic.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "ZIA",
    "vendor": "Zscaler",
    "versions": [
      {
        "lessThan": "6.2r.290",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

5.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

EPSS

0.001

Percentile

17.8%

Related for CVELIST:CVE-2023-28807