Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-13872


Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device.


Published

2025-03-12T12:15:14.273

Last Modified

2025-07-30T00:39:58.580

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

Weaknesses
  • Type: Primary
    CWE-319

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System bitdefender box_firmware ≤ 1.3.11.505 Yes
Hardware bitdefender box - No

References