
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2023-49570) was identified in Bitdefender Total Security's HTTPS scanning functionality, discovered and disclosed on October 18, 2024. The vulnerability affects Bitdefender Total Security versions prior to 27.0.25.115, where the software incorrectly trusts certificates issued by unauthorized entities when the 'Basic Constraints' extension indicates it is an 'End Entity' (Bitdefender Advisory, NVD).
The vulnerability has been assigned a CVSS v4.0 score of 8.6 (HIGH) with the vector string CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N, and a CVSS v3.1 score of 7.4 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N. The issue stems from improper certificate validation (CWE-295) where the software fails to properly validate the Basic Constraints extension in certificates (NVD).
The vulnerability could allow an attacker to perform Man-in-the-Middle (MITM) attacks, potentially intercepting and altering communications between the user and websites. This could lead to the compromise of sensitive information and potential manipulation of secure communications (Bitdefender Advisory).
Bitdefender has released an automatic update (version 27.0.25.115) that addresses this vulnerability. Users are strongly recommended to ensure their Bitdefender Total Security installation is updated to this version or later (Bitdefender Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."