First published: Fri Apr 04 2025(Updated: )
A server-side request forgery (SSRF) vulnerability in Bitdefender GravityZone Console allows an attacker to bypass input validation logic using leading characters in DNS requests. Paired with other potential vulnerabilities, this bypass could be used for execution of third party code. This issue affects GravityZone Console: before 6.41.2.1.
Credit: cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bitdefender GravityZone | <6.41.2.1 |
An automatic update to version 6.41.2.1 fixes the issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2243 is categorized as a high severity vulnerability due to its potential for server-side request forgery that can lead to unauthorized access and code execution.
To fix CVE-2025-2243, update your Bitdefender GravityZone Console to version 6.41.2.2 or later, as this version addresses the input validation issue.
CVE-2025-2243 can allow attackers to bypass security controls, potentially leading to unauthorized access to internal systems or execution of malicious code.
Yes, CVE-2025-2243 is exploitable remotely since it involves server-side request forgery through manipulated DNS requests.
Exploiting CVE-2025-2243 requires the attacker to manipulate DNS requests with leading characters, targeting vulnerable instances of Bitdefender GravityZone Console.