First published: Fri Oct 18 2024(Updated: )
A vulnerability has been discovered in Bitdefender Total Security HTTPS scanning functionality that results in the improper trust of certificates issued using the DSA signature algorithm. The product does not properly check the certificate chain, allowing an attacker to establish MITM SSL connections to arbitrary sites using a DSA-signed certificate.
Credit: cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bitdefender | <27.0.25.115 |
An automatic update to product version 27.0.25.115 fixes the issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6057 is classified as a high-severity vulnerability due to the potential for an attacker to exploit improper certificate trust.
To mitigate CVE-2023-6057, users should update Bitdefender Total Security to the latest version beyond 27.0.25.115.
CVE-2023-6057 affects specific versions of Bitdefender Total Security, particularly those prior to 27.0.25.115.
CVE-2023-6057 could allow an attacker to perform a Man-in-the-Middle (MITM) attack by improperly trusting DSA-signed certificates.
As of now, there are no confirmed reports of active exploitation of CVE-2023-6057, but it is recommended to apply updates promptly.