Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5317: CWE-862 Missing Authorization in Bitdefender Endpoint Security Tools for Mac

0
Medium
VulnerabilityCVE-2025-5317cvecve-2025-5317cwe-862
Published: Tue Nov 11 2025 (11/11/2025, 08:02:22 UTC)
Source: CVE Database V5
Vendor/Project: Bitdefender
Product: Endpoint Security Tools for Mac

Description

An improper access restriction to a folder in Bitdefender Endpoint Security Tools for Mac (BEST) before 7.20.52.200087 allows local users with administrative privileges to bypass the configured uninstall password protection. An unauthorized user with sudo privileges can manually remove the application directory (/Applications/Endpoint Security for Mac.app/) and the related directories within /Library/Bitdefender/AVP without needing the uninstall password.

AI-Powered Analysis

AILast updated: 11/11/2025, 08:22:12 UTC

Technical Analysis

CVE-2025-5317 is a vulnerability classified under CWE-862 (Missing Authorization) affecting Bitdefender Endpoint Security Tools for Mac versions prior to 7.20.52.200087. The issue stems from improper access control on the application directory (/Applications/Endpoint Security for Mac.app/) and associated directories within /Library/Bitdefender/AVP. Specifically, local users with administrative privileges who possess sudo rights can bypass the uninstall password protection mechanism by manually deleting these directories. This unauthorized removal circumvents the intended security controls designed to prevent uninstallation without proper authentication. The vulnerability does not require user interaction and has a CVSS 4.0 base score of 6.8, indicating a medium severity level. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required beyond high privileges (PR:H), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability, particularly integrity and availability, as the endpoint security software can be removed, potentially exposing the system to further threats. There are no known exploits in the wild at this time, and no patch links have been provided yet, suggesting the vendor may still be working on remediation. The vulnerability highlights the risk of insufficient authorization checks on critical security software components, especially in environments where multiple users have elevated privileges.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity and availability of endpoint security on Mac devices. If exploited, an attacker with sudo privileges can uninstall Bitdefender Endpoint Security Tools without authorization, effectively disabling protection and increasing the risk of malware infections, data breaches, or lateral movement within the network. Organizations with shared administrative access or insufficient privilege management are particularly vulnerable. This could lead to compliance issues under regulations such as GDPR if personal data is compromised due to weakened endpoint defenses. Additionally, sectors with high security requirements, such as finance, healthcare, and government, could face increased operational risk and reputational damage. The local nature of the exploit limits remote attack possibilities but does not eliminate insider threats or risks from compromised accounts with elevated privileges.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Restrict sudo and administrative privileges strictly to trusted personnel and minimize the number of users with such access on Mac endpoints. 2) Implement robust privilege access management (PAM) solutions to monitor and control the use of elevated privileges. 3) Employ file integrity monitoring tools to detect unauthorized changes or deletions in critical application directories, including /Applications/Endpoint Security for Mac.app/ and /Library/Bitdefender/AVP. 4) Enforce endpoint security policies that prevent unauthorized software removal or modification. 5) Regularly audit user permissions and sudoers configurations to ensure compliance with the principle of least privilege. 6) Monitor system logs for suspicious activity related to application removal or sudo command usage. 7) Apply vendor patches promptly once they become available to address the vulnerability directly. 8) Educate IT staff and users about the risks of privilege misuse and the importance of safeguarding administrative credentials.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Bitdefender
Date Reserved
2025-05-29T05:57:38.849Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6912f0f7b7bc43ed74712fdf

Added to database: 11/11/2025, 8:16:55 AM

Last enriched: 11/11/2025, 8:22:12 AM

Last updated: 11/12/2025, 9:14:48 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats