66 results (0.003 seconds)

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been identified in the Bitdefender Total Security HTTPS scanning functionality where the product incorrectly checks the site's certificate, which allows an attacker to make MITM SSL connections to an arbitrary site. The product trusts certificates that are issued using the MD5 and SHA1 collision hash functions which allow attackers to create rogue certificates that appear legitimate. • https://www.bitdefender.com/support/security-advisories/insecure-trust-of-certificates-using-collision-hash-functions-in-bitdefender-total-security-https-scanning-va-11239 • CWE-295: Improper Certificate Validation •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been identified in Bitdefender Safepay's handling of HTTPS connections. The issue arises when the product blocks a connection due to an untrusted server certificate but allows the user to add the site to exceptions, resulting in the product trusting the certificate for subsequent HTTPS scans. This vulnerability allows an attacker to perform a Man-in-the-Middle (MITM) attack by using a self-signed certificate, which the product will trust after the site has been added to exceptions. This can lead to the interception and potential alteration of secure communications. Se ha identificado una vulnerabilidad en el manejo de conexiones HTTPS por parte de Bitdefender Safepay. • https://www.bitdefender.com/support/security-advisories/https-certificate-validation-issue-in-bitdefender-safepay-va-11167 • CWE-295: Improper Certificate Validation •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been discovered in Bitdefender Total Security HTTPS scanning functionality that results in the improper trust of certificates issued using the DSA signature algorithm. The product does not properly check the certificate chain, allowing an attacker to establish MITM SSL connections to arbitrary sites using a DSA-signed certificate. Se ha descubierto una vulnerabilidad en la función de análisis HTTPS de Bitdefender Total Security que da como resultado la confianza indebida en los certificados emitidos mediante el algoritmo de firma DSA. El producto no comprueba correctamente la cadena de certificados, lo que permite a un atacante establecer conexiones SSL MITM con sitios arbitrarios mediante un certificado firmado por DSA. • https://www.bitdefender.com/support/security-advisories/insecure-trust-of-dsa-signed-certificates-in-bitdefender-total-security-https-scanning-va-11166 • CWE-295: Improper Certificate Validation •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been discovered in Bitdefender Total Security HTTPS scanning functionality that results in the improper trust of self-signed certificates. The product is found to trust certificates signed with the RIPEMD-160 hashing algorithm without proper validation, allowing an attacker to establish MITM SSL connections to arbitrary sites. Se ha descubierto una vulnerabilidad en la función de análisis HTTPS de Bitdefender Total Security que da lugar a una confianza indebida en los certificados autofirmados. Se ha descubierto que el producto confía en los certificados firmados con el algoritmo de hash RIPEMD-160 sin una validación adecuada, lo que permite a un atacante establecer conexiones SSL MITM con sitios arbitrarios. • https://www.bitdefender.com/support/security-advisories/insecure-trust-of-self-signed-certificates-in-bitdefender-total-security-https-scanning-va-11164 • CWE-295: Improper Certificate Validation •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been identified in Bitdefender Total Security HTTPS scanning functionality where the software fails to properly validate website certificates. Specifically, if a site certificate lacks the "Server Authentication" specification in the Extended Key Usage extension, the product does not verify the certificate's compliance with the site, deeming such certificates as valid. This flaw could allow an attacker to perform a Man-in-the-Middle (MITM) attack, intercepting and potentially altering communications between the user and the website. Se ha identificado una vulnerabilidad en la función de análisis HTTPS de Bitdefender Total Security, en la que el software no puede validar correctamente los certificados de los sitios web. En concreto, si un certificado de sitio no tiene la especificación "Server Authentication" (Autenticación de servidor) en la extensión Extended Key Usage (Uso extendido de clave), el producto no verifica la conformidad del certificado con el sitio y considera que dichos certificados son válidos. • https://bitdefender.com/support/security-advisories/improper-certificate-validation-in-bitdefender-total-security-https-scanning-va-11158 • CWE-295: Improper Certificate Validation •