ID CVE-2020-15297
Summary Insufficient validation in the Bitdefender Update Server and BEST Relay components of Bitdefender Endpoint Security Tools versions prior to 6.6.20.294 allows an unprivileged attacker to bypass the in-place mitigations and interact with hosts on the network. This issue affects: Bitdefender Update Server versions prior to 6.6.20.294.
References
Vulnerable Configurations
  • cpe:2.3:a:bitdefender:update_server:-:*:*:*:*:*:*:*
    cpe:2.3:a:bitdefender:update_server:-:*:*:*:*:*:*:*
CVSS
Base: 6.4 (as of 24-11-2020 - 18:40)
Impact:
Exploitability:
CWE CWE-918
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:N
refmap via4
misc https://www.bitdefender.com/support/security-advisories/server-side-request-forgery-bitdefender-update-server-va-9163/
Last major update 24-11-2020 - 18:40
Published 09-11-2020 - 09:15
Last modified 24-11-2020 - 18:40
Back to Top