
Cloud Vulnerability DB
A community-led vulnerabilities database
A NULL Pointer Dereference vulnerability (CVE-2021-4198) was discovered in the messagingipc.dll component of multiple Bitdefender products. The vulnerability affects Bitdefender Total Security, Internet Security, Antivirus Plus, Endpoint Security Tools, and VPN Standalone prior to their respective security updates. The issue was disclosed on March 7th, 2022, and was assigned a CVSS v3.1 base score of 6.1 (Medium) ([Vendor Advisory](https://www.bitdefender.com/support/security-advisories/messagingipc-dll-null-pointer-dereference-in-multiple-bitdefender-products-va-10016/), NVD).
The vulnerability is classified as a NULL Pointer Dereference (CWE-476) that exists within the Bitdefender Virus Shield. The flaw requires local access and low privileges to exploit. The vulnerability has a CVSS vector string of CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H, indicating local access requirements with low attack complexity (ZDI Advisory).
When exploited, this vulnerability allows attackers to arbitrarily crash product processes and generate crashdump files, potentially creating a denial-of-service condition on the affected system (Vendor Advisory, ZDI Advisory).
Bitdefender has released security updates to address this vulnerability. The fixed versions are: Bitdefender Total Security version 26.0.3.29, Internet Security version 26.0.3.29, Antivirus Plus version 26.0.3.29, Endpoint Security Tools version 7.2.2.92, and VPN Standalone version 25.5.0.48 (Vendor Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."