Cybersecurity firm Bitdefender has patched a severe flaw (CVE-2025-2244) in its GravityZone Console, which could allow unauthenticated attackers to execute arbitrary commands on vulnerable systems.
The vulnerability, discovered by researcher Nicolas Verdier (@n1nj4sec), has a near-maximum CVSSv4 score of 9.5, highlighting its critical risk profile.
CVE ID | CVE-2025-2244 |
CVSS Score | 9.5 (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) |
Affected Vendor | Bitdefender |
Affected Product | GravityZone Console (versions prior to 6.41.2-1) |
Patch Version | 6.41.2-1 (released via automatic update on April 4, 2025) |
The vulnerability stems from insecure PHP deserialization of the sendMailFromRemoteSource method within the Emails.php component.
Attackers can craft malicious serialized payloads to trigger PHP object injection, enabling them to:
“This flaw bypasses traditional security controls because it exploits a trusted component within the GravityZone architecture,” explained Verdier.
“Attackers could weaponize this to deploy ransomware, exfiltrate data, or move laterally across networks.”
To address the issue, Bitdefender released an automatic update (6.41.2-1) on April 4, 2025. Administrators should:
Organizations unable to apply updates immediately should consider temporary network segmentation for GravityZone servers.
Nicolas Verdier reported the vulnerability through Bitdefender’s coordinated disclosure program.
The discovery underscores persistent risks in legacy PHP serialization practices, which have been implicated in high-profile breaches since the early 2010s.
“Serialization vulnerabilities remain a low-hanging fruit for attackers,” said incident response lead Maria Chen of Synapse Security.
“Enterprises must prioritize software composition analysis to identify such pitfalls in critical infrastructure.”
Bitdefender has confirmed no active exploitation in the wild but urges immediate action due to the flaw’s ease of exploitation.
GravityZone powers endpoint security for over 500,000 businesses globally, making this patch essential for preventing large-scale cyber incidents.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…
Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…
Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…
Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…
The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…
Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…