First published: Wed Mar 12 2025(Updated: )
Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device.
Credit: cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bitdefender Box | >=1.3.11.490<=1.3.11.505 |
An automatic update to version 1.3.11.505 fixes the issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13872 is considered a high severity vulnerability due to the use of insecure HTTP protocol for downloading updates.
To fix CVE-2024-13872, update your Bitdefender Box to version 1.3.11.506 or later, which resolves the insecure update mechanism.
CVE-2024-13872 affects Bitdefender Box versions from 1.3.11.490 to 1.3.11.505.
An attacker exploiting CVE-2024-13872 could potentially download malicious assets to the device due to the insecure update mechanism.
There is no official workaround for CVE-2024-13872 other than upgrading to the fixed version as soon as possible.