CVE-2023-6055

7.4 HIGH

📋 TL;DR

This vulnerability in Bitdefender Total Security's HTTPS scanning allows attackers to perform Man-in-the-Middle attacks by intercepting communications when website certificates lack proper 'Server Authentication' validation. Users of Bitdefender Total Security with HTTPS scanning enabled are affected.

💻 Affected Systems

Products:
  • Bitdefender Total Security
Versions: Versions prior to the fix
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Bitdefender's HTTPS scanning feature enabled, which is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept and manipulate all HTTPS traffic, including sensitive data like passwords, financial information, and personal communications, leading to data theft or account compromise.

🟠

Likely Case

Targeted MITM attacks against specific users to intercept login credentials or sensitive information from commonly visited websites.

🟢

If Mitigated

With proper network controls and user awareness, impact is limited to potential interception of non-critical communications in controlled environments.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to perform MITM attacks, but the vulnerability itself is straightforward to exploit once in position.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest version with security updates

Vendor Advisory: https://bitdefender.com/support/security-advisories/improper-certificate-validation-in-bitdefender-total-security-https-scanning-va-11158/

Restart Required: Yes

Instructions:

1. Open Bitdefender Total Security 2. Check for updates in the main interface 3. Install all available updates 4. Restart your computer

🔧 Temporary Workarounds

Disable HTTPS Scanning

windows

Temporarily disable Bitdefender's HTTPS scanning feature to prevent exploitation

Open Bitdefender → Protection → Online Threat Prevention → Disable 'Scan SSL'

🧯 If You Can't Patch

  • Use alternative browsers or applications that don't rely on Bitdefender's HTTPS scanning for critical communications
  • Implement network-level protections and monitor for unusual certificate validation patterns

🔍 How to Verify

Check if Vulnerable:

Check Bitdefender version and ensure HTTPS scanning is enabled in settings

Check Version:

Open Bitdefender → Click on the version number in bottom-left corner

Verify Fix Applied:

Verify Bitdefender is updated to latest version and test HTTPS connections to sites with non-compliant certificates

📡 Detection & Monitoring

Log Indicators:

  • Unusual certificate validation failures or successes in Bitdefender logs
  • Multiple HTTPS connection attempts with unusual certificate patterns

Network Indicators:

  • Unexpected certificate authorities in HTTPS traffic
  • MITM proxy detection in network traffic

SIEM Query:

source="bitdefender" AND (event="certificate_validation" OR event="https_scan") AND result="success" AND certificate_eKU!="serverAuth"

🔗 References

📤 Share & Export