We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-13872

Bitdefender Box Insecure Update Mechanism Vulnerability in libboxhermes.so



Description

Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device.

Reserved 2025-02-13 | Published 2025-03-12 | Updated 2025-03-12 | Assigner Bitdefender


CRITICAL: 9.4CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-319: Cleartext Transmission of Sensitive Information

Product status

Default status
unaffected

1.3.11.490 before 1.3.11.505
affected

Credits

Alan Cao finder

References

bitdefender.com/...-in-libboxhermes-so-in-bitdefender-box-v1

cve.org (CVE-2024-13872)

nvd.nist.gov (CVE-2024-13872)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-13872

Support options

Helpdesk Chat, Email, Knowledgebase