Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device.
References
Configurations
Configuration 1 (hide)
AND |
|
History
30 Jul 2025, 00:39
Type | Values Removed | Values Added |
---|---|---|
First Time |
Bitdefender box
Bitdefender Bitdefender box Firmware |
|
CPE | cpe:2.3:h:bitdefender:box:-:*:*:*:*:*:*:* cpe:2.3:o:bitdefender:box_firmware:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
Summary |
|
|
References | () https://bitdefender.com/support/security-advisories/insecure-update-mechanism-vulnerability-in-libboxhermes-so-in-bitdefender-box-v1 - Vendor Advisory |
12 Mar 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-12 12:15
Updated : 2025-07-30 00:39
NVD link : CVE-2024-13872
Mitre link : CVE-2024-13872
CVE.ORG link : CVE-2024-13872
JSON object : View
Products Affected
bitdefender
- box_firmware
- box
CWE
CWE-319
Cleartext Transmission of Sensitive Information