CVE-2021-3423

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to load malicious DLL files via an uncontrolled search path in the OpenSSL component of Bitdefender GravityZone Business Security, enabling privilege escalation. It affects Bitdefender GravityZone Business Security installations prior to version 6.6.23.329. Attackers could gain elevated privileges on affected systems.

💻 Affected Systems

Products:
  • Bitdefender GravityZone Business Security
Versions: Versions prior to 6.6.23.329
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system to exploit. The vulnerability is in how OpenSSL is used within the Bitdefender product.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing installation of persistent malware, data theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation where an authenticated user gains higher privileges than intended, potentially compromising the security agent and bypassing security controls.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, though the vulnerability still exists in unpatched systems.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to place malicious DLL in search path. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.6.23.329

Vendor Advisory: https://www.bitdefender.com/support/security-advisories/privilege-escalation-in-bitdefender-gravityzone-business-security-va-9557

Restart Required: Yes

Instructions:

1. Log into GravityZone Control Center. 2. Navigate to Security Management > Updates. 3. Deploy the update to all endpoints. 4. Restart affected systems after update installation.

🔧 Temporary Workarounds

Restrict DLL loading permissions

windows

Configure Windows to restrict DLL loading from untrusted locations using application control policies

Configure Windows Defender Application Control or AppLocker policies

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor for suspicious DLL loading events and file creation in system directories

🔍 How to Verify

Check if Vulnerable:

Check Bitdefender GravityZone Business Security version in Control Center or on endpoint via GUI/registry

Check Version:

Check registry: HKEY_LOCAL_MACHINE\SOFTWARE\Bitdefender\Desktop\ProductInfo\Version

Verify Fix Applied:

Verify version is 6.6.23.329 or later in GravityZone Control Center

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DLL loading from non-standard paths
  • Security agent service restarts or failures
  • Privilege escalation attempts

Network Indicators:

  • Unusual outbound connections from security agent

SIEM Query:

EventID=4688 AND ProcessName LIKE '%bdagent%' AND CommandLine CONTAINS 'dll'

🔗 References

📤 Share & Export