Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-6154", "assignerOrgId": "b3d5ebe7-963e-41fb-98e1-2edaeabb8f82", "state": "PUBLISHED", "assignerShortName": "Bitdefender", "dateReserved": "2023-11-15T13:17:52.814Z", "datePublished": "2024-04-01T10:06:57.864Z", "dateUpdated": "2024-08-12T18:40:14.131Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Total Security", "vendor": "Bitdefender", "versions": [{"status": "affected", "version": "27.0.25.114"}]}, {"defaultStatus": "unaffected", "product": "Internet Security", "vendor": "Bitdefender", "versions": [{"status": "affected", "version": "27.0.25.114"}]}, {"defaultStatus": "unaffected", "product": "Antivirus Plus", "vendor": "Bitdefender", "versions": [{"status": "affected", "version": "27.0.25.114"}]}, {"defaultStatus": "unaffected", "product": "Antivirus Free", "vendor": "Bitdefender", "versions": [{"status": "affected", "version": "27.0.25.114"}]}], "datePublic": "2024-04-01T09:00:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "A configuration setting issue in seccenter.exe as used in Bitdefender Total Security, Bitdefender Internet Security, Bitdefender Antivirus Plus, Bitdefender Antivirus Free allows an attacker to change the product's expected behavior and potentially load a third-party library upon execution. This issue affects Total Security: 27.0.25.114; Internet Security: 27.0.25.114; Antivirus Plus: 27.0.25.114; Antivirus Free: 27.0.25.114."}], "value": "A configuration setting issue in seccenter.exe as used in Bitdefender Total Security, Bitdefender Internet Security, Bitdefender Antivirus Plus, Bitdefender Antivirus Free allows an attacker to change the product's expected behavior and potentially load a third-party library upon execution. This issue affects Total Security: 27.0.25.114; Internet Security: 27.0.25.114; Antivirus Plus: 27.0.25.114; Antivirus Free: 27.0.25.114."}], "impacts": [{"capecId": "CAPEC-203", "descriptions": [{"lang": "en", "value": "CAPEC-203 Manipulate Registry Information"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-15", "description": "CWE-15: External Control of System or Configuration Setting", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "b3d5ebe7-963e-41fb-98e1-2edaeabb8f82", "shortName": "Bitdefender", "dateUpdated": "2024-04-01T10:06:57.864Z"}, "references": [{"url": "https://bitdefender.com/support/security-advisories/local-privilege-escalation-in-bitdefender-total-security-va-11168/"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "An automatic update to version 27.0.25.115 fixes the issue."}], "value": "An automatic update to version\u00a027.0.25.115 fixes the issue."}], "source": {"discovery": "UNKNOWN"}, "title": "Local privilege escalation in Bitdefender Total Security (VA-11168)", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T08:21:17.586Z"}, "title": "CVE Program Container", "references": [{"url": "https://bitdefender.com/support/security-advisories/local-privilege-escalation-in-bitdefender-total-security-va-11168/", "tags": ["x_transferred"]}]}, {"affected": [{"vendor": "bitdefender", "product": "total_security", "cpes": ["cpe:2.3:a:bitdefender:total_security:27.0.25.114:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "27.0.25.114", "status": "affected"}]}, {"vendor": "bitdefender", "product": "internet_security", "cpes": ["cpe:2.3:a:bitdefender:internet_security:27.0.25.114:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "27.0.25.114", "status": "affected"}]}, {"vendor": "bitdefender", "product": "antivirus_plus", "cpes": ["cpe:2.3:a:bitdefender:antivirus_plus:27.0.25.114:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "27.0.25.114", "status": "affected"}]}, {"vendor": "bitdefender", "product": "antivirus", "cpes": ["cpe:2.3:a:bitdefender:antivirus:27.0.25.114:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "27.0.25.114", "status": "affected"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-04-02T15:38:45.661553Z", "id": "CVE-2023-6154", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-08-12T18:40:14.131Z"}}]}}