Zscaler Client Connector CVE-2024-31127

| EUVD-2024-29038 HIGH
Origin Validation Error (CWE-346)
2025-06-04 [email protected]
7.3
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low

Lifecycle Timeline

6
Analysis Updated
Apr 16, 2026 - 06:45 EUVD-patch-fix
executive_summary
Re-analysis Queued
Apr 16, 2026 - 05:29 backfill_euvd_patch
patch_released
Patch available
Apr 16, 2026 - 05:29 EUVD
4.2.0.241
Analysis Generated
Mar 14, 2026 - 17:29 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:29 euvd
EUVD-2024-29038
CVE Published
Jun 04, 2025 - 05:15 nvd
HIGH 7.3

DescriptionNVD

An improper verification of a loaded library in Zscaler Client Connector on Mac < 4.2.0.241 may allow a local attacker to elevate their privileges.

AnalysisAI

Privilege escalation vulnerability in Zscaler Client Connector for macOS versions prior to 4.2.0.241, caused by improper verification of loaded libraries. A local attacker with standard user privileges can exploit this weakness without user interaction to gain elevated system privileges, potentially compromising system integrity and confidentiality. The CVSS 7.3 score reflects the moderate-to-high severity of local privilege escalation with high impact on confidentiality and integrity.

Technical ContextAI

This vulnerability exists in the Zscaler Client Connector (CPE: cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*), specifically affecting macOS versions below 4.2.0.241. The root cause is classified under CWE-346 (Origin Validation Error), indicating that the application fails to properly validate or verify the authenticity and source of dynamically loaded libraries. On macOS, this typically manifests as insufficient checks on library search paths, code signing verification, or runtime library loading mechanisms. An attacker could exploit this by placing a malicious library in a location where the application searches for dependencies (such as DYLD_LIBRARY_PATH manipulation or writable shared library directories), allowing arbitrary code execution with the privileges of the vulnerable process.

RemediationAI

Patching: Upgrade Zscaler Client Connector to version 4.2.0.241 or later on all affected macOS systems; priority: Critical Verification: Verify Client Connector version via system settings or 'about' menu; confirm automatic updates are enabled to prevent regression Interim Mitigation: Restrict local user account privileges on macOS systems running vulnerable versions; disable DYLD_* environment variables that could be exploited for library injection Monitoring: Monitor process execution and library loading patterns for suspicious .dylib loading from non-standard locations; review audit logs for privilege escalation attempts

Share

CVE-2024-31127 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy