First published: Fri Oct 18 2024(Updated: )
A vulnerability has been identified in Bitdefender Total Security HTTPS scanning functionality where the software fails to properly validate website certificates. Specifically, if a site certificate lacks the "Server Authentication" specification in the Extended Key Usage extension, the product does not verify the certificate's compliance with the site, deeming such certificates as valid. This flaw could allow an attacker to perform a Man-in-the-Middle (MITM) attack, intercepting and potentially altering communications between the user and the website.
Credit: cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bitdefender | <27.0.25.115 |
An automatic update to product version 27.0.25.115 fixes the issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6055 has been assigned a severity rating that indicates a significant risk due to improper certificate validation in Bitdefender Total Security.
To mitigate CVE-2023-6055, ensure you update Bitdefender Total Security to the latest version beyond 27.0.25.115.
CVE-2023-6055 affects the HTTPS scanning functionality of Bitdefender Total Security.
The impact of CVE-2023-6055 allows potential attackers to present fraudulent certificates, compromising secured connections.
Versions of Bitdefender Total Security up to 27.0.25.115 are vulnerable to CVE-2023-6055.