First published: Mon Jan 27 2020(Updated: )
A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability.
Credit: cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bitdefender Box 2 Firmware | =2.1.47.42 | |
Bitdefender Box 2 Firmware | =2.1.53.45 | |
Bitdefender BOX 2 |
An update that mitigates the issue has been delivered in: Bitdefender Central Android App version 2.0.66.88 Bitdefender Central iOS App version 2.0.66
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17095 is a command injection vulnerability in Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45.
CVE-2019-17095 has a severity rating of 9.8 (Critical).
Bitdefender BOX 2 firmware versions 2.1.47.42 and 2.1.53.45 are affected by CVE-2019-17095.
CVE-2019-17095 allows remote attackers to execute arbitrary system commands by supplying a malicious firmware URL through the `/api/download_image` API method.
Yes, Bitdefender has released a security advisory with instructions on how to apply the necessary updates to fix CVE-2019-17095.