First published: Tue Apr 09 2024(Updated: )
An Incorrect Regular Expression vulnerability in Bitdefender GravityZone Update Server allows an attacker to cause a Server Side Request Forgery and reconfigure the relay. This issue affects the following products that include the vulnerable component: Bitdefender Endpoint Security for Linux version 7.0.5.200089 Bitdefender Endpoint Security for Windows version 7.9.9.380 GravityZone Control Center (On Premises) version 6.36.1
Credit: cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bitdefender Endpoint Security | =7.0.5.200089 | |
Bitdefender Endpoint Security | =7.9.9.380 | |
Bitdefender GravityZone Control Center | =6.36.1 | |
Bitdefender Endpoint Security | ||
Bitdefender Endpoint Security | ||
Bitdefender GravityZone Control Center |
An automatic update to the following versions fixes the issues: Bitdefender Endpoint Security for Linux version 7.0.5.200090 Bitdefender Endpoint Security for Windows version 7.9.9.381 GravityZone Control Center (On Premises) version 6.36.1-1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-2223 is classified as high due to its potential for server-side request forgery.
To mitigate CVE-2024-2223, ensure your Bitdefender products are updated to the latest version that addresses this vulnerability.
CVE-2024-2223 affects Bitdefender Endpoint Security for Linux, Bitdefender Endpoint Security for Windows, and Bitdefender GravityZone Control Center.
CVE-2024-2223 can facilitate a server-side request forgery attack, allowing an attacker to manipulate requests sent by the server.
CVE-2024-2223 is caused by an incorrect regular expression vulnerability present in the Bitdefender GravityZone Update Server.