Refine your search

1 vulnerability found for ZIA by Zscaler

CVE-2023-28807 (GCVE-0-2023-28807)
Vulnerability from cvelistv5
Published
2024-01-31 19:16
Modified
2025-06-17 21:29
CWE
  • CWE-295 - Improper Certificate Validation
Summary
In Zscaler Internet Access (ZIA) a mismatch between Connect Host and Client Hello's Server Name Indication (SNI) enables attackers to evade network security controls by hiding their communications within legitimate traffic.
Impacted products
Vendor Product Version
Zscaler ZIA Version: 0   < 6.2r.290
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T13:51:38.890Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://help.zscaler.com/zia/configuring-advanced-settings#domain-fronting"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://help.zscaler.com/zia/configuring-advanced-settings#dns-optimization"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-28807",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-14T21:06:39.806468Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-17T21:29:19.136Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "ZIA",
          "vendor": "Zscaler",
          "versions": [
            {
              "lessThan": "6.2r.290",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Citi Red Team"
        }
      ],
      "datePublic": "2024-02-01T02:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In Zscaler Internet Access (ZIA) a mismatch between Connect Host and Client Hello\u0027s Server Name Indication (SNI) enables attackers to evade network security controls by hiding their communications within legitimate traffic."
            }
          ],
          "value": "In Zscaler Internet Access (ZIA) a mismatch between Connect Host and Client Hello\u0027s Server Name Indication (SNI) enables attackers to evade network security controls by hiding their communications within legitimate traffic."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-554",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-554 Functionality Bypass"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295 Improper Certificate Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-31T19:17:15.685Z",
        "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04",
        "shortName": "Zscaler"
      },
      "references": [
        {
          "url": "https://help.zscaler.com/zia/configuring-advanced-settings#domain-fronting"
        },
        {
          "url": "https://help.zscaler.com/zia/configuring-advanced-settings#dns-optimization"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Bypass of ZIA domain fronting detection module through evasion technique",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04",
    "assignerShortName": "Zscaler",
    "cveId": "CVE-2023-28807",
    "datePublished": "2024-01-31T19:16:59.806Z",
    "dateReserved": "2023-03-23T18:29:15.803Z",
    "dateUpdated": "2025-06-17T21:29:19.136Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}