CVE-2020-15279

Scanning exclusion paths disclosure in BEST for Windows

Description

An Improper Access Control vulnerability in the logging component of Bitdefender Endpoint Security Tools for Windows versions prior to 6.6.23.320 allows a regular user to learn the scanning exclusion paths. This issue was discovered during external security research.

Remediation

Solution:

  • An automatic update to version 6.6.23.320 fixes the issue.

Category

4.0
CVSS
Severity: Medium
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.11%
Vendor Advisory bitdefender.com
Affected: BItdefenderd Endpoint Security Tools for Windows
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2020-15279?
CVE-2020-15279 has been scored as a medium severity vulnerability.
How to fix CVE-2020-15279?
To fix CVE-2020-15279: An automatic update to version 6.6.23.320 fixes the issue.
Is CVE-2020-15279 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2020-15279 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2020-15279?
CVE-2020-15279 affects BItdefenderd Endpoint Security Tools for Windows.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.