Wednesday, April 23, 2025
HomeCVE/vulnerabilityBitdefender Identifies Security Vulnerabilities Enabling Man-in-the-Middle Exploits

Bitdefender Identifies Security Vulnerabilities Enabling Man-in-the-Middle Exploits

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity firm Bitdefender has disclosed two high-severity security vulnerabilities affecting its legacy BOX v1 device, exposing users to potential remote code execution and man-in-the-middle attacks.

The vulnerabilities, identified on March 12th, 2025, affect a product that is no longer sold or supported by the company, but the disclosure demonstrates Bitdefender’s ongoing commitment to security transparency even for discontinued products.

Critical Vulnerabilities in Legacy Hardware

The Bitdefender BOX v1, once marketed as a comprehensive security solution for smart homes, has been found to contain serious security flaws that could compromise entire networks.

- Advertisement - Google News

Security researchers discovered two distinct vulnerabilities with identical CVSS scores of 9.4, indicating critical severity levels requiring immediate attention from any remaining users of the device.

The first vulnerability allows for unauthenticated command injection, while the second enables potential exploitation through an insecure update mechanism that is susceptible to man-in-the-middle attacks.

These findings are particularly troubling as they affect a device specifically designed to enhance network security.

When security appliances themselves become vectors for attack, the consequences can be far more severe than vulnerabilities in standard consumer electronics.

Network security devices typically have privileged access to traffic and connected devices, making them high-value targets for sophisticated threat actors seeking to compromise multiple systems simultaneously.

Technical Details of the Vulnerabilities

The first vulnerability (CVE-2024-13871) involves an unauthenticated command injection flaw in the /check_image_and_trigger_recovery API endpoint of Bitdefender BOX v1 devices running firmware version 1.3.11.490.

This security issue allows network-adjacent attackers to execute arbitrary commands on the device without requiring authentication credentials.

The potential impact includes full system compromise, with attackers gaining the ability to modify system configurations, access sensitive information, or use the device as a launching point for further network intrusions.

The second vulnerability (CVE-2024-13872) affects versions 1.3.11.490 through 1.3.11.505 and stems from the device’s use of insecure HTTP protocol when downloading updates over the internet.

The vulnerability can be triggered through the /set_temp_token API method, allowing network-adjacent attackers to perform man-in-the-middle attacks during the update process.

By intercepting and modifying the update traffic, attackers could potentially inject malicious code that would be executed with system privileges when the device restarts its daemons, leading to full remote code execution capabilities.

CVE IDCVSS ScoreAffected ProductVulnerability DetailsRemediation
CVE-2024-138719.4Bitdefender BOX v1 (fw 1.3.11.490)Command injection in /check_image_and_trigger_recovery API allowing unauthenticated code executionUpdate to version 1.3.11.510
CVE-2024-138729.4Bitdefender BOX v1 (v1.3.11.490-505)Insecure HTTP protocol for updates enabling man-in-the-middle attacksProduct unsupported; upgrade recommended

The discovery and disclosure of these vulnerabilities highlight the persistent security challenges in IoT and network security devices.

Even as products reach end-of-life, their vulnerabilities can present ongoing risks to users who continue to deploy them.

Bitdefender’s disclosure of these issues, credited to their internal researchers and external security analyst Alan Cao, serves as an important reminder of the critical importance of lifecycle security management for all network-connected devices.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field...

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored...

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with...

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection

Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field...

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored...

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with...