First published: Mon Jan 27 2020(Updated: )
An exploitable command execution vulnerability exists in the recovery partition of Bitdefender BOX 2, version 2.0.1.91. The API method `/api/update_setup` does not perform firmware signature checks atomically, leading to an exploitable race condition (TOCTTOU) that allows arbitrary execution of system commands. This issue affects: Bitdefender Bitdefender BOX 2 versions prior to 2.1.47.36.
Credit: cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bitdefender Box 2 Firmware | <2.1.47.36 | |
Bitdefender BOX 2 |
Updating to firmware version 2.1.47.36 resolves this issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-17102 is critical with a severity value of 8.1.
The affected software of CVE-2019-17102 is Bitdefender BOX 2 firmware version up to 2.1.47.36.
The vulnerability in CVE-2019-17102 can be exploited by performing an arbitrary execution of system commands through a race condition in the API method /api/update_setup.
No, Bitdefender BOX 2 is not vulnerable to CVE-2019-17102.
To fix the vulnerability in CVE-2019-17102, users should apply the necessary firmware update provided by Bitdefender.