CVE-2024-2223
Bitdefender Endpoint Security Tools vulnerability analysis and mitigation

Overview

An Incorrect Regular Expression vulnerability (CVE-2024-2223) was discovered in Bitdefender GravityZone Update Server, affecting multiple Bitdefender products including Endpoint Security for Linux (version 7.0.5.200089), Endpoint Security for Windows (version 7.9.9.380), and GravityZone Control Center (On Premises version 6.36.1). The vulnerability was disclosed on April 9th, 2024, and received a CVSS v3.1 base score of 8.1, indicating high severity (Bitdefender Advisory).

Technical details

The vulnerability stems from an incorrect regular expression implementation in the GravityZone Update Server that could enable Server Side Request Forgery (SSRF). The flaw allows attackers to send crafted requests that can be misinterpreted as legitimate by the server. The vulnerability has a network attack vector with high attack complexity, requires no privileges or user interaction, and can potentially impact the confidentiality, integrity, and availability of the system (Cybersecurity News, Bitdefender Advisory).

Impact

A successful exploitation of this vulnerability could allow attackers to reconfigure the update relay, potentially disrupting update delivery or injecting malicious updates into the network. The impact extends to complete control over the confidentiality (data theft), integrity (data modification), and availability (server disruption) of the Update Server (Cybersecurity News).

Mitigation and workarounds

Bitdefender has released security updates to address the vulnerability. Users should upgrade to the following patched versions: Bitdefender Endpoint Security for Linux version 7.0.5.200090, Endpoint Security for Windows version 7.9.9.381, and GravityZone Control Center (On Premises) version 6.36.1-1 (Bitdefender Advisory).

Additional resources


SourceThis report was generated using AI

Related Bitdefender Endpoint Security Tools vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-2224CRITICAL9.8
  • Bitdefender Endpoint Security ToolsBitdefender Endpoint Security Tools
  • cpe:2.3:a:bitdefender:endpoint_security_tools
NoYesApr 09, 2024
CVE-2024-2223CRITICAL9.8
  • Bitdefender Endpoint Security ToolsBitdefender Endpoint Security Tools
  • cpe:2.3:a:bitdefender:endpoint_security_tools
NoYesApr 09, 2024
CVE-2025-7073HIGH8.8
  • Bitdefender Internet SecurityBitdefender Internet Security
  • cpe:2.3:a:bitdefender:endpoint_security_tools
NoYesDec 10, 2025
CVE-2021-4199HIGH7.8
  • Bitdefender Internet SecurityBitdefender Internet Security
  • cpe:2.3:a:bitdefender:total_security
NoYesMar 07, 2022
CVE-2022-0677HIGH7.5
  • Bitdefender Endpoint Security ToolsBitdefender Endpoint Security Tools
  • cpe:2.3:a:bitdefender:endpoint_security_tools:*:*:*:*:*:windows:*:*
NoYesApr 07, 2022

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management