First published: Wed Jul 31 2024(Updated: )
A verbose error handling issue in the proxy service implemented in the GravityZone Update Server allows an attacker to cause a server-side request forgery. This issue only affects GravityZone Console versions before 6.38.1-5 running only on premise.
Credit: cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bitdefender GravityZone | <6.38.1-5 | |
Bitdefender GravityZone Console | <6.38.1-5 |
An automatic update to product version 6.38.1-5 fixes the issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6980 is classified as a high severity vulnerability due to its potential for server-side request forgery.
To fix CVE-2024-6980, update the GravityZone Console to version 6.38.1-5 or later.
CVE-2024-6980 affects Bitdefender GravityZone Console versions prior to 6.38.1-5.
Yes, CVE-2024-6980 can lead to data breaches by allowing attackers to manipulate server requests.
Yes, CVE-2024-6980 affects only on-premises installations of the GravityZone Console.