CVE-2023-6057

7.4 HIGH

📋 TL;DR

This vulnerability in Bitdefender Total Security's HTTPS scanning feature improperly trusts DSA-signed certificates, allowing attackers to perform man-in-the-middle (MITM) attacks and intercept encrypted traffic to arbitrary websites. It affects users of Bitdefender Total Security with HTTPS scanning enabled, potentially compromising sensitive data like passwords and financial information.

💻 Affected Systems

Products:
  • Bitdefender Total Security
Versions: Versions prior to the patch; specific version range not detailed in reference, but check vendor advisory for updates.
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with HTTPS scanning enabled in Bitdefender Total Security; other Bitdefender products may not be impacted.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers can intercept and decrypt all HTTPS traffic, stealing sensitive data such as login credentials, financial details, and personal communications, leading to identity theft or financial loss.

🟠

Likely Case

Targeted MITM attacks in controlled environments (e.g., public Wi-Fi) to capture specific user data, resulting in credential theft or session hijacking.

🟢

If Mitigated

If HTTPS scanning is disabled or patches are applied, the risk is minimal as the vulnerability is isolated to the scanning feature.

🌐 Internet-Facing: MEDIUM with brief explanation: Exploitation requires an attacker to be in a position to intercept network traffic (e.g., on the same network), but it does not directly expose systems to remote attacks without user interaction.
🏢 Internal Only: LOW with brief explanation: The vulnerability primarily affects external HTTPS connections; internal network traffic is less likely to be targeted unless an attacker has internal access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access to perform MITM attacks, but no authentication is needed; attackers must craft DSA-signed certificates to exploit the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Bitdefender updates for the latest version; refer to vendor advisory for specifics.

Vendor Advisory: https://www.bitdefender.com/support/security-advisories/insecure-trust-of-dsa-signed-certificates-in-bitdefender-total-security-https-scanning-va-11166/

Restart Required: No

Instructions:

1. Open Bitdefender Total Security. 2. Check for updates in the settings or dashboard. 3. Install any available updates. 4. Ensure HTTPS scanning is still enabled if needed, as the patch should resolve the issue.

🔧 Temporary Workarounds

Disable HTTPS Scanning

windows

Temporarily turn off HTTPS scanning in Bitdefender to prevent exploitation until patched.

Open Bitdefender Total Security > Settings > Privacy > HTTPS Scanning > Toggle off

🧯 If You Can't Patch

  • Disable HTTPS scanning in Bitdefender settings to eliminate the vulnerability.
  • Use alternative security software or rely on browser-based HTTPS without scanning until a patch is applied.

🔍 How to Verify

Check if Vulnerable:

Check if HTTPS scanning is enabled in Bitdefender and if the software version is unpatched; review vendor advisory for version details.

Check Version:

Open Bitdefender Total Security > Click on the version number in the main interface or check in About section.

Verify Fix Applied:

After updating, verify that HTTPS scanning works without errors and check the version matches the patched release in Bitdefender settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual certificate warnings in Bitdefender logs, failed HTTPS connections, or alerts related to DSA certificates.

Network Indicators:

  • Suspicious MITM activity on network traffic, unexpected DSA-signed certificates in SSL/TLS handshakes.

SIEM Query:

Example: search for events where source_ip intercepts HTTPS traffic and certificate_algorithm contains 'DSA' in network logs.

🔗 References

📤 Share & Export