CVE-2026-22569
Received Received - Intake
Startup Configuration Flaw in Zscaler Client Connector Causes Traffic Inspection Bypass

Publication date: 2026-03-31

Last updated on: 2026-04-06

Assigner: Zscaler, Inc.

Description
An incorrect startup configuration of affected versions of Zscaler Client Connector on Windows may cause a limited amount of traffic from being inspected under rare circumstances.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-06
Generated
2026-05-07
AI Q&A
2026-03-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
zscaler client_connector From 4.7 (inc) to 4.7.0.141 (exc)
zscaler client_connector From 4.8 (inc) to 4.8.0.63 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1289 The product receives an input value that is used as a resource identifier or other type of reference, but it does not validate or incorrectly validates that the input is equivalent to a potentially-unsafe value.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is caused by an incorrect startup configuration in certain versions of the Zscaler Client Connector on Windows. Under rare circumstances, this misconfiguration may result in a limited amount of network traffic not being inspected as intended.


How can this vulnerability impact me? :

Because some traffic may bypass inspection due to this vulnerability, there is a risk that malicious or unauthorized data could pass through without detection. This could potentially lead to security risks such as data leakage or exposure to threats that would normally be blocked or monitored.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart