A vulnerability has been identified in Bitdefender Safepay's handling of HTTPS connections. The issue arises when the product blocks a connection due to an untrusted server certificate but allows the user to add the site to exceptions, resulting in the product trusting the certificate for subsequent HTTPS scans. This vulnerability allows an attacker to perform a Man-in-the-Middle (MITM) attack by using a self-signed certificate, which the product will trust after the site has been added to exceptions. This can lead to the interception and potential alteration of secure communications.
References
Configurations
History
22 Oct 2024, 16:00
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:* | |
First Time |
Bitdefender
Bitdefender total Security |
|
Summary |
|
|
References | () https://www.bitdefender.com/support/security-advisories/https-certificate-validation-issue-in-bitdefender-safepay-va-11167/ - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
18 Oct 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-18 08:15
Updated : 2024-10-22 16:00
NVD link : CVE-2023-6058
Mitre link : CVE-2023-6058
CVE.ORG link : CVE-2023-6058
JSON object : View
Products Affected
bitdefender
- total_security
CWE
CWE-295
Improper Certificate Validation