https://ift.tt/prcPCqG How To Prepare For Your Virtual Doctor Visit To Get The Most From Your Consultation
https://ift.tt/prcPCqG How To Prepare For Your Virtual Doctor Visit To Get The Most From Your Consultation
- Get link
- X
- Other Apps
Bitdefender has recently fixed a critical Server-Side Request Forgery (SSRF) vulnerability in its GravityZone Console On-Premise, known as CVE-2024-4177.
This flaw, discovered in the host whitelist parser, could have allowed malicious actors to exploit the system by sending crafted requests, potentially leading to unauthorized access and data breaches.
The vulnerability was first reported by security researcher Nicolas VERDIER (n1nj4sec) who noted that the host whitelist parser in the GravityZone Console did not properly validate input, enabling attackers to manipulate server requests.
With ANYRUN You can Analyze any URL, Files & Email for Malicious Activity : Start your Analysis
This vulnerability, found in the host whitelist parser of the GravityZone Console On-Premise, allows attackers to send crafted requests that the server can misinterpret as legitimate. Here are the primary impacts on users:
Bitdefender has responded promptly by releasing a security advisory and a patch to address the issue. The company emphasized the importance of updating to the latest version to mitigate any potential risks associated with this vulnerability.
Users of the GravityZone Console On-Premise are advised to apply the patch immediately to ensure their systems are protected against possible exploitation attempts.
Bitdefender has released a patch to address the SSRF vulnerability. Users should immediately update their GravityZone Console On-Premise to the latest version, which includes the fix for this issue. The patched version is 6.38.1-2
Looking for Full Data Breach Protection? Try Cynet's All-in-One Cybersecurity Platform for MSPs: Try Free Demo
The post Bitdefender GravityZone Flaw Let Hackers Launch SSRF Attacks appeared first on Cyber Security News.
Comments
Post a Comment
Commenter vous !