A vulnerability has been detected in Bitdefender Antivirus Free 2020 that allows one hacker load unsigned code that could lead to privileges.
According to Safebreach, the main issue with this product is that the code integrity protection mechanism does not start up allowing an attacker to load unsigned code. The risk here is particularly high, because the software acts as NT AUTHORITY \ SYSTEM, the most privileged user account making it access this is very important for an unauthorized person.
"The vulnerability gives to hackers the ability to load and execute malicious payloads using a service. This capability can be circumvented by an attacker, for example to obtain an Application Whitelisting Bypass for purposes such as execution and tax evasion, "Safebreach says.
The main causes behind the vulnerability are the lack of secure loading DLL due to the existence of an uncontrolled search path and no digital certificate validation against the binary.
Safebreach reported the issue to Bitdefender on 17 July. The company responded immediately and was able to confirm the issue by August 14. Five days later, BitDefender published one Advisory and confirmed the CVE-2019-15295.
Bitdefender told SC Media that the issue was raised by Safebreach through the company's bug bounty program.
"We were informed of the issue and posted our advice on our website. The issue has been fixed and we automatically updated our customer base before the releases. We started our bug bounty program two years ago to increase it safety and the reliability of the code base and to offer the best security to our customers ", said Bogdan" Bob "Botezatu, Director of Research and Threat Reporting of Bitdefender.