{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-11128","assignerOrgId":"b3d5ebe7-963e-41fb-98e1-2edaeabb8f82","state":"PUBLISHED","assignerShortName":"Bitdefender","dateReserved":"2024-11-12T07:36:28.444Z","datePublished":"2025-01-13T21:49:30.628Z","dateUpdated":"2025-01-14T00:17:56.801Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["MacOS"],"product":"Virus Scanner","vendor":"Bitdefender","versions":[{"lessThan":"3.18","status":"affected","version":"0","versionType":"custom"}]}],"datePublic":"2025-01-13T21:40:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A vulnerability in the BitdefenderVirusScanner binary as used in&nbsp;Bitdefender Virus Scanner for MacOS may allow .<strong>dynamic library injection</strong>&nbsp;(DYLD injection) without being blocked by AppleMobileFileIntegrity (AMFI). This issue is caused by the absence of Hardened Runtime or Library Validation signing. This issue affects Bitdefender Virus Scanner versions before 3.18."}],"value":"A vulnerability in the BitdefenderVirusScanner binary as used in Bitdefender Virus Scanner for MacOS may allow .dynamic library injection (DYLD injection) without being blocked by AppleMobileFileIntegrity (AMFI). This issue is caused by the absence of Hardened Runtime or Library Validation signing. This issue affects Bitdefender Virus Scanner versions before 3.18."}],"impacts":[{"capecId":"CAPEC-233","descriptions":[{"lang":"en","value":"CAPEC-233 Privilege Escalation"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":8.4,"baseSeverity":"HIGH","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"ACTIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-269","description":"CWE-269 Improper Privilege Management","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"b3d5ebe7-963e-41fb-98e1-2edaeabb8f82","shortName":"Bitdefender","dateUpdated":"2025-01-13T21:49:30.628Z"},"references":[{"url":"https://www.bitdefender.com/support/security-advisories/insufficient-hardened-runtime-or-library-validation-signing-in-bitdefender-virus-scanner-for-macos/"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An automatic update to version 3.18 fixes the issue."}],"value":"An automatic update to version 3.18 fixes the issue."}],"source":{"discovery":"EXTERNAL"},"title":"Insufficient Hardened Runtime or Library Validation signing in Bitdefender Virus Scanner for macOS","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-14T00:17:38.415149Z","id":"CVE-2024-11128","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-14T00:17:56.801Z"}}]}}