Cyber Security News

Bitdefender GravityZone Console PHP Vulnerability Lets Hackers Execute Arbitrary Commands

Cybersecurity firm Bitdefender has patched a severe flaw (CVE-2025-2244) in its GravityZone Console, which could allow unauthenticated attackers to execute arbitrary commands on vulnerable systems.

The vulnerability, discovered by researcher Nicolas Verdier (@n1nj4sec), has a near-maximum CVSSv4 score of 9.5, highlighting its critical risk profile.

CVE-2025-2244: Key Details

CVE IDCVE-2025-2244
CVSS Score9.5 (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)
Affected VendorBitdefender
Affected ProductGravityZone Console (versions prior to 6.41.2-1)
Patch Version6.41.2-1 (released via automatic update on April 4, 2025)

Technical Breakdown

The vulnerability stems from insecure PHP deserialization of the sendMailFromRemoteSource method within the Emails.php component.

Attackers can craft malicious serialized payloads to trigger PHP object injection, enabling them to:

  1. Write arbitrary files to the system.
  2. Execute operating system commands with elevated privileges.
  3. Potentially compromise the entire GravityZone environment.

“This flaw bypasses traditional security controls because it exploits a trusted component within the GravityZone architecture,” explained Verdier.

“Attackers could weaponize this to deploy ransomware, exfiltrate data, or move laterally across networks.”

Mitigation Steps for Organizations

To address the issue, Bitdefender released an automatic update (6.41.2-1) on April 4, 2025. Administrators should:

  1. Verify patch installation: Ensure GravityZone Console is running version 6.41.2-1 or later.
  2. Audit logs: Check for unusual activity, particularly unexpected mail-related processes or file modifications.
  3. Limit exposure: Restrict external access to GravityZone’s management interface if not required.

Organizations unable to apply updates immediately should consider temporary network segmentation for GravityZone servers.

Nicolas Verdier reported the vulnerability through Bitdefender’s coordinated disclosure program.

The discovery underscores persistent risks in legacy PHP serialization practices, which have been implicated in high-profile breaches since the early 2010s.

“Serialization vulnerabilities remain a low-hanging fruit for attackers,” said incident response lead Maria Chen of Synapse Security.

“Enterprises must prioritize software composition analysis to identify such pitfalls in critical infrastructure.”

Bitdefender has confirmed no active exploitation in the wild but urges immediate action due to the flaw’s ease of exploitation.

GravityZone powers endpoint security for over 500,000 businesses globally, making this patch essential for preventing large-scale cyber incidents.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

1 day ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

1 day ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

1 day ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

1 day ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

1 day ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

2 days ago