Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device.
History

Wed, 30 Jul 2025 00:45:00 +0000

Type Values Removed Values Added
First Time appeared Bitdefender box Firmware
CPEs cpe:2.3:h:bitdefender:box:-:*:*:*:*:*:*:*
cpe:2.3:o:bitdefender:box_firmware:*:*:*:*:*:*:*:*
Vendors & Products Bitdefender box Firmware
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00025}

epss

{'score': 0.00039}


Wed, 12 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 12 Mar 2025 12:00:00 +0000

Type Values Removed Values Added
Description Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device.
Title Bitdefender Box Insecure Update Mechanism Vulnerability in libboxhermes.so
Weaknesses CWE-319
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Bitdefender

Published: 2025-03-12T11:47:46.419Z

Updated: 2025-03-12T14:09:37.026Z

Reserved: 2025-02-13T17:36:46.927Z

Link: CVE-2024-13872

cve-icon Vulnrichment

Updated: 2025-03-12T14:09:25.714Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-12T12:15:14.273

Modified: 2025-07-30T00:39:58.580

Link: CVE-2024-13872

cve-icon Redhat

No data.