Lucene search

K
cve[email protected]CVE-2021-3554
HistoryNov 24, 2021 - 4:15 p.m.

CVE-2021-3554

2021-11-2416:15:13
CWE-284
web.nvd.nist.gov
23
cve-2021-3554
improper access control
bitdefender
endpoint security tools
linux
vulnerability
nvd

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.3%

Improper Access Control vulnerability in the patchesUpdate API as implemented in Bitdefender Endpoint Security Tools for Linux as a relay role allows an attacker to manipulate the remote address used for pulling patches. This issue affects: Bitdefender Endpoint Security Tools for Linux versions prior to 6.6.27.390; versions prior to 7.1.2.33. Bitdefender Unified Endpoint versions prior to 6.2.21.160. Bitdefender GravityZone versions prior to 6.24.1-1.

Affected configurations

NVD
Node
bitdefenderendpoint_security_toolsRange<6.6.27.390
OR
bitdefenderendpoint_security_toolsRange<6.6.27.390linux
OR
bitdefenderendpoint_security_toolsRange7.0.0.007.1.2.33
OR
bitdefendergravityzoneRange<6.24.1-1
OR
bitdefendergravityzoneMatch6.24.1-1

CNA Affected

[
  {
    "product": "Endpoint Security Tools for Linux",
    "vendor": "Bitdefender",
    "versions": [
      {
        "lessThan": "6.6.27.390",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThan": "7.1.2.33",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Unified Endpoint",
    "vendor": "Bitdefender",
    "versions": [
      {
        "lessThan": "6.2.21.160",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "GravityZone",
    "vendor": "Bitdefender",
    "versions": [
      {
        "lessThan": "6.24.1-1",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.3%

Related for CVE-2021-3554