CVE-2024-13872

Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:bitdefender:box_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:bitdefender:box:-:*:*:*:*:*:*:*

History

30 Jul 2025, 00:39

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Bitdefender box
Bitdefender
Bitdefender box Firmware
CPE cpe:2.3:h:bitdefender:box:-:*:*:*:*:*:*:*
cpe:2.3:o:bitdefender:box_firmware:*:*:*:*:*:*:*:*
References () https://bitdefender.com/support/security-advisories/insecure-update-mechanism-vulnerability-in-libboxhermes-so-in-bitdefender-box-v1 - () https://bitdefender.com/support/security-advisories/insecure-update-mechanism-vulnerability-in-libboxhermes-so-in-bitdefender-box-v1 - Vendor Advisory

12 Mar 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-12 12:15

Updated : 2025-07-30 00:39


NVD link : CVE-2024-13872

Mitre link : CVE-2024-13872


JSON object : View

Products Affected

bitdefender

  • box
  • box_firmware
CWE
CWE-319

Cleartext Transmission of Sensitive Information