First published: Fri Oct 18 2024(Updated: )
A vulnerability has been identified in Bitdefender Total Security HTTPS scanning functionality where the software trusts a certificate issued by an entity that isn't authorized to issue certificates. This occurs when the "Basic Constraints" extension in the certificate indicates that it is meant to be an "End Entity”. This flaw could allow an attacker to perform a Man-in-the-Middle (MITM) attack, intercepting and potentially altering communications between the user and the website.
Credit: cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bitdefender | <27.0.25.115 |
An automatic update to product version 27.0.25.115 fixes the issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49570 is classified as a high severity vulnerability due to insecure trust in certificate validation.
To fix CVE-2023-49570, ensure that you update Bitdefender Total Security to the latest version that addresses the vulnerability.
CVE-2023-49570 affects Bitdefender Total Security versions up to 27.0.25.115.
CVE-2023-49570 may allow unauthorized access or exploitation through improper certificate validation.
Yes, CVE-2023-49570 specifically involves a vulnerability in the HTTPS scanning functionality of Bitdefender Total Security.