zscaler CVE Vulnerabilities & Metrics

Focus on zscaler vulnerabilities and metrics.

Last updated: 08 Mar 2026, 23:25 UTC

About zscaler Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with zscaler. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total zscaler CVEs: 44
Earliest CVE date: 16 Feb 2021, 20:15 UTC
Latest CVE date: 23 Feb 2026, 17:23 UTC

Latest CVE reference: CVE-2026-22568

Rolling Stats

30-day Count (Rolling): 2
365-day Count (Rolling): 2

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -90.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -90.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical zscaler CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 0.71

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 40
4.0-6.9 1
7.0-8.9 2
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS zscaler CVEs

These are the five CVEs with the highest CVSS scores for zscaler, sorted by severity first and recency.

All CVEs for zscaler

CVE-2026-22568 zscaler vulnerability CVSS: 0 23 Feb 2026, 17:23 UTC

Improper neutralization of special elements in user-supplied input within the ZIA Admin UI could allow an authenticated administrator to access or retrieve unauthorized internal information in rare conditions.

CVE-2026-22567 zscaler vulnerability CVSS: 0 23 Feb 2026, 17:23 UTC

Improper validation of user-supplied input in the ZIA Admin UI could allow an authenticated administrator to initiate backend functions through specific input fields in limited scenarios.

CVE-2024-23483 zscaler vulnerability CVSS: 0 06 Aug 2024, 16:15 UTC

An Improper Input Validation vulnerability in Zscaler Client Connector on MacOS allows OS Command Injection. This issue affects Zscaler Client Connector on MacOS <4.2.

CVE-2024-23464 zscaler vulnerability CVSS: 0 06 Aug 2024, 16:15 UTC

In certain cases, Zscaler Internet Access (ZIA) can be disabled by PowerShell commands with admin rights. This affects Zscaler Client Connector on Windows <4.2.1

CVE-2024-23460 zscaler vulnerability CVSS: 0 06 Aug 2024, 16:15 UTC

The Zscaler Updater process does not validate the digital signature of the installer before execution, allowing arbitrary code to be locally executed. This affects Zscaler Client Connector on MacOS <4.2.

CVE-2024-23458 zscaler vulnerability CVSS: 0 06 Aug 2024, 16:15 UTC

While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows <4.2.0.190.

CVE-2024-23456 zscaler vulnerability CVSS: 0 06 Aug 2024, 16:15 UTC

Anti-tampering can be disabled under certain conditions without signature validation. This affects Zscaler Client Connector <4.2.0.190 with anti-tampering enabled.

CVE-2023-28806 zscaler vulnerability CVSS: 0 06 Aug 2024, 16:15 UTC

An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering. This issue affects Client Connector on Windows <4.2.0.190.

CVE-2024-3661 zscaler vulnerability CVSS: 0 06 May 2024, 19:15 UTC

DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.

CVE-2024-23462 zscaler vulnerability CVSS: 0 02 May 2024, 13:23 UTC

An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on MacOS allows a denial of service of the Client Connector binary and thus removing client functionality.This issue affects Client Connector on MacOS: before 3.4.

CVE-2024-23461 zscaler vulnerability CVSS: 0 02 May 2024, 13:23 UTC

An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on MacOS during the upgrade process may allow a Local Execution of Code.This issue affects Client Connector on MacOS: before 3.4.

CVE-2024-23459 zscaler vulnerability CVSS: 0 02 May 2024, 13:23 UTC

An Improper Link Resolution Before File Access ('Link Following') vulnerability in Zscaler Client Connector on Mac allows a system file to be overwritten.This issue affects Zscaler Client Connector on Mac : before 3.7.

CVE-2023-41971 zscaler vulnerability CVSS: 0 02 May 2024, 13:23 UTC

An Improper Link Resolution Before File Access ('Link Following') vulnerability in Zscaler Client Connector on Windows allows a system file to be overwritten.This issue affects Client Connector on Windows: before 3.7.

CVE-2023-41970 zscaler vulnerability CVSS: 0 02 May 2024, 13:23 UTC

An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on Windows during the Repair App functionality may allow Local Execution of Code.This issue affects Client Connector on Windows: before 4.1.0.62.

CVE-2023-28798 zscaler vulnerability CVSS: 0 02 May 2024, 13:23 UTC

An out-of-bounds write to heap in the pacparser library on Zscaler Client Connector on Mac may lead to arbitrary code execution.

CVE-2024-23480 zscaler vulnerability CVSS: 0 01 May 2024, 17:15 UTC

A fallback mechanism in code sign checking on macOS may allow arbitrary code execution. This issue affects Zscaler Client Connector on MacOS prior to 4.2.

CVE-2024-23457 zscaler vulnerability CVSS: 0 01 May 2024, 17:15 UTC

The anti-tampering functionality of the Zscaler Client Connector can be disabled under certain conditions when an uninstall password is enforced. This affects Zscaler Client Connector on Windows prior to 4.2.0.209

CVE-2024-23463 zscaler vulnerability CVSS: 0 30 Apr 2024, 17:15 UTC

Anti-tampering protection of the Zscaler Client Connector can be bypassed under certain conditions when running the Repair App functionality. This affects Zscaler Client Connector on Windows prior to 4.2.1

CVE-2024-23482 zscaler vulnerability CVSS: 0 26 Mar 2024, 15:15 UTC

The ZScaler service is susceptible to a local privilege escalation vulnerability found in the ZScalerService process. Fixed Version: Mac ZApp 4.2.0.241 and later.

CVE-2023-41973 zscaler vulnerability CVSS: 0 26 Mar 2024, 15:15 UTC

ZSATray passes the previousInstallerName as a config parameter to TrayManager, and TrayManager constructs the path and appends previousInstallerName to get the full path of the exe. Fixed Version: Win ZApp 4.3.0.121 and later.

CVE-2023-41972 zscaler vulnerability CVSS: 0 26 Mar 2024, 15:15 UTC

In some rare cases, there is a password type validation missing in Revert Password check and for some features it could be disabled. Fixed Version: Win ZApp 4.3.0.121 and later.

CVE-2023-41969 zscaler vulnerability CVSS: 0 26 Mar 2024, 15:15 UTC

An arbitrary file deletion in ZSATrayManager where it protects the temporary encrypted ZApp issue reporting file from the unprivileged end user access and modification. Fixed version: Win ZApp 4.3.0 and later.

CVE-2023-28802 zscaler vulnerability CVSS: 0 21 Nov 2023, 11:15 UTC

An Improper Validation of Integrity Check Value in Zscaler Client Connector on Windows allows an authenticated user to disable ZIA/ZPA by interrupting the service restart from Zscaler Diagnostics. This issue affects Client Connector: before 4.2.0.149.

CVE-2023-28794 zscaler vulnerability CVSS: 0 06 Nov 2023, 08:15 UTC

Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Privilege Abuse. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.

CVE-2023-28805 zscaler vulnerability CVSS: 0 23 Oct 2023, 14:15 UTC

An Improper Input Validation vulnerability in Zscaler Client Connector on Linux allows Privilege Escalation. This issue affects Client Connector: before 1.4.0.105

CVE-2023-28804 zscaler vulnerability CVSS: 0 23 Oct 2023, 14:15 UTC

An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: before 1.4.0.105

CVE-2023-28803 zscaler vulnerability CVSS: 0 23 Oct 2023, 14:15 UTC

An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.

CVE-2023-28797 zscaler vulnerability CVSS: 0 23 Oct 2023, 14:15 UTC

Zscaler Client Connector for Windows before 4.1 writes/deletes a configuration file inside specific folders on the disk. A malicious user can replace the folder and execute code as a privileged user.

CVE-2023-28796 zscaler vulnerability CVSS: 0 23 Oct 2023, 14:15 UTC

Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.

CVE-2023-28795 zscaler vulnerability CVSS: 0 23 Oct 2023, 14:15 UTC

Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Inclusion of Code in Existing Process. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.

CVE-2023-28793 zscaler vulnerability CVSS: 0 23 Oct 2023, 14:15 UTC

Buffer overflow vulnerability in the signelf library used by Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.

CVE-2021-26738 zscaler vulnerability CVSS: 0 23 Oct 2023, 14:15 UTC

Zscaler Client Connector for macOS prior to 3.7 had an unquoted search path vulnerability via the PATH variable. A local adversary may be able to execute code with root privileges.

CVE-2021-26737 zscaler vulnerability CVSS: 0 23 Oct 2023, 14:15 UTC

The Zscaler Client Connector for macOS prior to 3.6 did not sufficiently validate RPC clients. A local adversary without sufficient privileges may be able to shutdown the Zscaler tunnel by exploiting a race condition.

CVE-2021-26736 zscaler vulnerability CVSS: 0 23 Oct 2023, 14:15 UTC

Multiple vulnerabilities in the Zscaler Client Connector Installer and Uninstaller for Windows prior to 3.6 allowed execution of binaries from a low privileged path. A local adversary may be able to execute code with SYSTEM privileges.

CVE-2021-26735 zscaler vulnerability CVSS: 0 23 Oct 2023, 14:15 UTC

The Zscaler Client Connector Installer and Unsintallers for Windows prior to 3.6 had an unquoted search path vulnerability. A local adversary may be able to execute code with SYSTEM privileges.

CVE-2021-26734 zscaler vulnerability CVSS: 0 23 Oct 2023, 14:15 UTC

Zscaler Client Connector Installer on Windows before version 3.4.0.124 improperly handled directory junctions during uninstallation. A local adversary may be able to delete folders in an elevated context.

CVE-2023-41717 zscaler vulnerability CVSS: 0 31 Aug 2023, 16:15 UTC

Inappropriate file type control in Zscaler Proxy versions 3.6.1.25 and prior allows local attackers to bypass file download/upload restrictions.

CVE-2023-28801 zscaler vulnerability CVSS: 0 31 Aug 2023, 14:15 UTC

An Improper Verification of Cryptographic Signature in the SAML authentication of the Zscaler Admin UI allows a Privilege Escalation.This issue affects Admin UI: from 6.2 before 6.2r.

CVE-2023-28800 zscaler vulnerability CVSS: 0 22 Jun 2023, 20:15 UTC

When using local accounts for administration, the redirect url parameter was not encoded correctly, allowing for an XSS attack providing admin login.

CVE-2023-28799 zscaler vulnerability CVSS: 0 22 Jun 2023, 20:15 UTC

A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.

CVE-2020-11634 zscaler vulnerability CVSS: 6.9 15 Jul 2021, 20:15 UTC

The Zscaler Client Connector for Windows prior to 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context.

CVE-2020-11632 zscaler vulnerability CVSS: 7.2 15 Jul 2021, 20:15 UTC

The Zscaler Client Connector prior to 2.1.2.150 did not quote the search path for services, which allows a local adversary to execute code with system privileges.

CVE-2020-11633 zscaler vulnerability CVSS: 10.0 15 Jul 2021, 18:15 UTC

The Zscaler Client Connector for Windows prior to 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers. An adversary would potentially have been able to execute arbitrary code with system privileges.

CVE-2020-11635 zscaler vulnerability CVSS: 7.2 16 Feb 2021, 20:15 UTC

The Zscaler Client Connector prior to 3.1.0 did not sufficiently validate RPC clients, which allows a local adversary to execute code with system privileges or perform limited actions for which they did not have privileges.