Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 12 Mar 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device. | |
Title | Bitdefender Box Insecure Update Mechanism Vulnerability in libboxhermes.so | |
Weaknesses | CWE-319 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Bitdefender
Published: 2025-03-12T11:47:46.419Z
Updated: 2025-03-12T14:09:37.026Z
Reserved: 2025-02-13T17:36:46.927Z
Link: CVE-2024-13872

Updated: 2025-03-12T14:09:25.714Z

Status : Received
Published: 2025-03-12T12:15:14.273
Modified: 2025-03-12T12:15:14.273
Link: CVE-2024-13872

No data.