CVE-2024-13871
Published: 12 March 2025
Description
Adversaries may abuse Unix shell commands and scripts for execution.
Security Summary
CVE-2024-13871 is a command injection vulnerability (CWE-77) in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 running firmware version 1.3.11.490. Published on 2025-03-12, it carries a CVSS v3.1 base score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on the affected device.
An unauthenticated, network-adjacent attacker can exploit this vulnerability with low complexity and no required privileges or user interaction. Successful exploitation allows execution of arbitrary commands on the device, potentially resulting in full remote code execution (RCE) and compromise of confidentiality, integrity, and availability.
Bitdefender has issued a security advisory on the unauthenticated command injection in Bitdefender Box V1, available at https://bitdefender.com/support/security-advisories/unauthenticated-command-injection-in-bitdefender-box-v1, which security practitioners should review for details on mitigation and patching.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Command injection in web API endpoint enables unauthenticated RCE on network-adjacent device, directly mapping to exploitation of the application (T1190) and arbitrary command execution via Unix shell (T1059.004).