CVE-2025-54983
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: Zscaler, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zscaler | zscaler_client_connector | 4.6 |
| zscaler | zscaler_client_connector | 4.7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-772 | The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a health check port in Zscaler Client Connector on Windows versions before 4.6.0.216 and 4.7.0.47. Under certain conditions, the port was not properly released after use, which could allow network traffic to bypass the forwarding controls of the Zscaler Client Connector.
How can this vulnerability impact me? :
The vulnerability could allow unauthorized network traffic to bypass the forwarding controls of the Zscaler Client Connector, potentially leading to security risks such as exposure to unfiltered or malicious traffic within a protected network environment.