First published: Fri Oct 18 2024(Updated: )
A vulnerability has been identified in Bitdefender Safepay's handling of HTTPS connections. The issue arises when the product blocks a connection due to an untrusted server certificate but allows the user to add the site to exceptions, resulting in the product trusting the certificate for subsequent HTTPS scans. This vulnerability allows an attacker to perform a Man-in-the-Middle (MITM) attack by using a self-signed certificate, which the product will trust after the site has been added to exceptions. This can lead to the interception and potential alteration of secure communications.
Credit: cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bitdefender | <27.0.25.115 |
An automatic update to product version 27.0.25.115 fixes the issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6058 has been classified as a high severity vulnerability due to its potential to compromise secure HTTPS connections.
To fix CVE-2023-6058, ensure you're using the latest version of Bitdefender Safepay and avoid adding untrusted sites to exceptions.
CVE-2023-6058 affects Bitdefender Total Security versions up to 27.0.25.115.
CVE-2023-6058 is related to improper validation of HTTPS server certificates within Bitdefender Safepay.
Yes, CVE-2023-6058 can potentially allow man-in-the-middle attacks if users mistakenly trust unverified certificates.