First published: Fri Oct 18 2024(Updated: )
A vulnerability has been discovered in Bitdefender Total Security HTTPS scanning functionality that results in the improper trust of self-signed certificates. The product is found to trust certificates signed with the RIPEMD-160 hashing algorithm without proper validation, allowing an attacker to establish MITM SSL connections to arbitrary sites.
Credit: cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bitdefender | <27.0.25.115 |
An automatic update to product version 27.0.25.115 fixes the issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6056 is classified as a medium severity vulnerability due to its impact on the integrity of secure communications.
To fix CVE-2023-6056, users should update their Bitdefender Total Security to the latest version that addresses this vulnerability.
The impact of CVE-2023-6056 allows attackers to exploit the improper trust of self-signed certificates, potentially leading to man-in-the-middle attacks.
CVE-2023-6056 affects all versions of Bitdefender Total Security up to version 27.0.25.115.
As of now, the best way to mitigate CVE-2023-6056 is to ensure you are using the latest version of Bitdefender Total Security, as no official workaround has been provided.