Cyber Posture

CVE-2024-13871

High

Published: 12 March 2025

Published
12 March 2025
Modified
30 July 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0288 86.3th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2024-13871 is a command injection vulnerability (CWE-77) in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 running firmware version 1.3.11.490. Published on 2025-03-12, it carries a CVSS v3.1 base score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on the affected device.

An unauthenticated, network-adjacent attacker can exploit this vulnerability with low complexity and no required privileges or user interaction. Successful exploitation allows execution of arbitrary commands on the device, potentially resulting in full remote code execution (RCE) and compromise of confidentiality, integrity, and availability.

Bitdefender has issued a security advisory on the unauthenticated command injection in Bitdefender Box V1, available at https://bitdefender.com/support/security-advisories/unauthenticated-command-injection-in-bitdefender-box-v1, which security practitioners should review for details on mitigation and patching.

Details

CWE(s)
CWE-77

Affected Products

bitdefender
box firmware
1.3.11.490

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection in web API endpoint enables unauthenticated RCE on network-adjacent device, directly mapping to exploitation of the application (T1190) and arbitrary command execution via Unix shell (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References