Critical Bitdefender Vulnerabilities Let Attackers Gain Control Over System
Bitdefender GravityZone Update Server (versions 6.36.1, Endpoint Safety for Linux 7.0.5.200089, and Endpoint Safety for Windows 7.9.9.380) is at anxiousness of server-facet search recordsdata from forgery (SSRF) resulting from an unsuitable traditional expression.
The weakness permits an attacker to send crafted requests to the server that will doubtless be misinterpreted as reliable. The server, tricked by the irregular expression, will then unknowingly end those requests.
Within the context of SSRF, these requests might per chance perhaps per chance even be designed to retrieve confidential recordsdata from internal systems, manipulate internal configurations, and even pivot to numerous parts of the network.
On this case, a successful exploit might per chance perhaps allow an attacker to reconfigure the exchange relay, doubtlessly disrupting exchange shipping or injecting malicious updates into the network.
Bitdefender’s GravityZone
Bitdefender’s GravityZone Update Server has a severe vulnerability (CVSS ranking: 8.1) that might per chance perhaps allow an attacker a long way off access (attack vector: network) to compromise the server with low privileges (privileges required: none).
The vulnerability complexity is high (attack complexity: high), that ability it will merely require in point of fact excellent skills or recordsdata to milk, the place an exploit might per chance perhaps merely already exist (temporal ranking no longer provided), and there’s no such thing as a person interaction needed (person interaction: none) to rob support of this vulnerability.
AI-Powered Safety for Enterprise Electronic mail Safety
Trustifi’s Evolved chance protection prevents the widest spectrum of refined assaults sooner than they attain a person’s mailbox. Stopping ninety 9% of phishing assaults uncared for by numerous electronic mail security alternate options. .
The vulnerability might per chance perhaps give an attacker total retain watch over over the confidentiality (attacker can rob recordsdata), integrity (attacker can regulate recordsdata), and availability (attacker can disable the server) of the Update Server.
Bitdefender GravityZone Update Server suffers from an Unsuitable Usual Expression vulnerability, which permits attackers to forge server-facet requests and manipulate the exchange relay configuration.
A weakness in the implemented traditional expression permits unauthorized modification, doubtlessly main to a compromise of the exchange relay, which impacts Bitdefender Endpoint Safety for Linux (model 7.0.5.200089), Endpoint Safety for Windows (model 7.9.9.380), and GravityZone Retain watch over Heart (On-Premises model 6.36.1).
A severe security exchange has been launched to address vulnerabilities (CVE-2024-2223 & CVE-2024-2224), doubtlessly allowing attackers to escalate privileges or doubtlessly manipulate the exchange server.
Users of Bitdefender Endpoint Safety for Linux (model 7.0.5.200089) and Windows (model 7.9.9.380), along with those managing GravityZone Retain watch over Heart (On-Premises model 6.36.1), ought to peaceable give a rob to to the corresponding patched versions (Linux model 7.0.5.200090, Windows model 7.9.9.381, and GravityZone Retain watch over Heart model 6.36.1-1) to mitigate these dangers.
Bitdefender launched security updates to address two vulnerabilities (CVE-2024-2223 and CVE-2024-2224) in GravityZone. These updates impression Bitdefender Endpoint Safety for Linux (model 7.0.5.200089), Endpoint Safety for Windows (model 7.9.9.380), and GravityZone Retain watch over Heart (On-Premises model 6.36.1).
CVE-2024-2223 permits attackers to adjust the exchange server by a conventional expression flaw doubtlessly.
CVE-2024-2224 is more severe, enabling privilege escalation on affected systems. Upgrading to Bitdefender Endpoint Safety for Linux model 7.0.5.200090, Endpoint Safety for Windows model 7.9.9.381, and GravityZone Retain watch over Heart (On-Premises) model 6.36.1-1 mitigates the vulnerabilities.
Secure your emails in a heartbeat! To find your ideal email security vendor, Take a Free 30-Second Assessment.
Source credit : cybersecuritynews.com