Vulnerability Description
A Server-Side Request Forgery (SSRF) vulnerability in the EPPUpdateService of Bitdefender Endpoint Security Tools allows an attacker to use the Endpoint Protection relay as a proxy for any remote host. This issue affects: Bitdefender Endpoint Security Tools versions prior to 6.6.27.390; versions prior to 7.1.2.33. Bitdefender Unified Endpoint for Linux versions prior to 6.2.21.160. Bitdefender GravityZone versions prior to 6.24.1-1.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bitdefender | Endpoint Security Tools | < 6.2.21.160 |
| Bitdefender | Gravityzone | 6.24.1-1 |
Related Weaknesses (CWE)
References
- https://www.bitdefender.com/support/security-advisories/server-side-request-forgBroken Link
- https://www.bitdefender.com/support/security-advisories/server-side-request-forgVendor Advisory
- https://www.bitdefender.com/support/security-advisories/server-side-request-forgBroken Link
FAQ
What is CVE-2021-3553?
CVE-2021-3553 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A Server-Side Request Forgery (SSRF) vulnerability in the EPPUpdateService of Bitdefender Endpoint Security Tools allows an attacker to use the Endpoint Protection relay as a proxy for any remote host...
How severe is CVE-2021-3553?
CVE-2021-3553 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-3553?
Check the references section above for vendor advisories and patch information. Affected products include: Bitdefender Endpoint Security Tools, Bitdefender Gravityzone.