CVE-2024-13871
Published: 12 March 2025
Summary
CVE-2024-13871 is a high-severity Command Injection (CWE-77) vulnerability in Bitdefender Box Firmware. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 13.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates command injection by requiring validation and sanitization of inputs to the vulnerable API endpoint.
Addresses the specific flaw in firmware version 1.3.11.490 through timely patching and remediation as advised by the vendor.
Prevents unauthenticated network-adjacent access to the dangerous /check_image_and_trigger_recovery API endpoint by explicitly authorizing or restricting such actions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in web API endpoint enables unauthenticated RCE on network-adjacent device, directly mapping to exploitation of the application (T1190) and arbitrary command execution via Unix shell (T1059.004).
NVD Description
A command injection vulnerability exists in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 (firmware version 1.3.11.490). This flaw allows an unauthenticated, network-adjacent attacker to execute arbitrary commands on the device, potentially leading to full remote code execution (RCE).
Deeper analysisAI
CVE-2024-13871 is a command injection vulnerability (CWE-77) in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 running firmware version 1.3.11.490. Published on 2025-03-12, it carries a CVSS v3.1 base score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on the affected device.
An unauthenticated, network-adjacent attacker can exploit this vulnerability with low complexity and no required privileges or user interaction. Successful exploitation allows execution of arbitrary commands on the device, potentially resulting in full remote code execution (RCE) and compromise of confidentiality, integrity, and availability.
Bitdefender has issued a security advisory on the unauthenticated command injection in Bitdefender Box V1, available at https://bitdefender.com/support/security-advisories/unauthenticated-command-injection-in-bitdefender-box-v1, which security practitioners should review for details on mitigation and patching.
Details
- CWE(s)