Bitdefender Total Security fixes multiple flaws classified as high severity, just below critical
Take action: Update your Bitdefender Total Security. This is not optional, and it should have happened automatically. Check that you have the 27.0.25.115 version or later. If not, update ASAP.
Learn More
Bitdefender fixes multiple vulnerabilities related to improper certificate validation in its HTTPS scanning functionality in their Total Security product.
Bitdefender Total Security is a cybersecurity suite that provides advanced protection against malware, ransomware, phishing, and other online threats across multiple platforms, including Windows, macOS, Android, and iOS devices.
These flaws allow potential attackers to conduct Man-in-the-Middle (MITM) attacks, enabling interception and modification of user communications.
-
CVE-2023-6055 (CVSS score 8.6) - This vulnerability arises from Bitdefender’s failure to properly validate website certificates. It incorrectly deems certificates valid even when the "Server Authentication" specification is missing in the Extended Key Usage extension.
-
CVE-2023-6056 (CVSS score 8.6) - Bitdefender improperly trusts self-signed certificates signed with the RIPEMD-160 hashing algorithm, allowing attackers to establish SSL connections using self-signed certificates.
-
CVE-2023-6057 (CVSS score 8.6) - This vulnerability involves insecure trust of DSA-signed certificates, as Bitdefender fails to check the certificate chain adequately.
-
CVE-2023-49567 (CVSS score 8.6) - Bitdefender incorrectly trusts certificates using collision-prone hash functions like MD5 and SHA1, enabling attackers to use rogue certificates that appear legitimate.
-
CVE-2023-49570 (CVSS score 8.6) - This vulnerability is linked to Bitdefender’s failure to validate the "Basic Constraints" extension in certificates. Attackers could exploit this to establish MITM connections.
Bitdefender has released an automatic update, version 27.0.25.115, that addresses all the identified vulnerabilities. The update corrects HTTPS certificate validation and strengthens security against MITM attacks.
Users are strongly advised to update to version 27.0.25.115 or later to mitigate these risks.