First published: Mon Jan 13 2025(Updated: )
A vulnerability in the BitdefenderVirusScanner binary as used in Bitdefender Virus Scanner for MacOS may allow .dynamic library injection (DYLD injection) without being blocked by AppleMobileFileIntegrity (AMFI). This issue is caused by the absence of Hardened Runtime or Library Validation signing. This issue affects Bitdefender Virus Scanner versions before 3.18.
Credit: cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bitdefender Virus Scanner for macOS | <3.18 | |
Bitdefender Virus Scanner for macOS | <3.18 |
An automatic update to version 3.18 fixes the issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11128 is rated as a high severity vulnerability due to its potential for dynamic library injection without sufficient checks.
To fix CVE-2024-11128, ensure you update the Bitdefender Virus Scanner to version 3.18 or newer, which addresses this vulnerability.
CVE-2024-11128 affects Bitdefender Virus Scanner on MacOS up to version 3.18.
CVE-2024-11128 does not require remote exploitation, as it can be triggered locally on the affected system.
Failure to address CVE-2024-11128 may allow malicious actors to perform unauthorized actions via DYLD injection, compromising system integrity.