Cyber Posture

CVE-2024-13871

High

Published: 12 March 2025

Published
12 March 2025
Modified
30 July 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0288 86.4th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-13871 is a high-severity Command Injection (CWE-77) vulnerability in Bitdefender Box Firmware. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 13.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates command injection by requiring validation and sanitization of inputs to the vulnerable API endpoint.

prevent

Addresses the specific flaw in firmware version 1.3.11.490 through timely patching and remediation as advised by the vendor.

prevent

Prevents unauthenticated network-adjacent access to the dangerous /check_image_and_trigger_recovery API endpoint by explicitly authorizing or restricting such actions.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection in web API endpoint enables unauthenticated RCE on network-adjacent device, directly mapping to exploitation of the application (T1190) and arbitrary command execution via Unix shell (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A command injection vulnerability exists in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 (firmware version 1.3.11.490). This flaw allows an unauthenticated, network-adjacent attacker to execute arbitrary commands on the device, potentially leading to full remote code execution (RCE).

Deeper analysisAI

CVE-2024-13871 is a command injection vulnerability (CWE-77) in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 running firmware version 1.3.11.490. Published on 2025-03-12, it carries a CVSS v3.1 base score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on the affected device.

An unauthenticated, network-adjacent attacker can exploit this vulnerability with low complexity and no required privileges or user interaction. Successful exploitation allows execution of arbitrary commands on the device, potentially resulting in full remote code execution (RCE) and compromise of confidentiality, integrity, and availability.

Bitdefender has issued a security advisory on the unauthenticated command injection in Bitdefender Box V1, available at https://bitdefender.com/support/security-advisories/unauthenticated-command-injection-in-bitdefender-box-v1, which security practitioners should review for details on mitigation and patching.

Details

CWE(s)

Affected Products

bitdefender
box firmware
1.3.11.490

CVEs Like This One

CVE-2024-13872Same product: Bitdefender Box
CVE-2025-29228Shared CWE-77
CVE-2025-52690Shared CWE-77
CVE-2025-14756Shared CWE-77
CVE-2026-3518Shared CWE-77
CVE-2024-43028Shared CWE-77
CVE-2024-12992Shared CWE-77
CVE-2026-22623Shared CWE-77
CVE-2024-57539Shared CWE-77
CVE-2026-41304Shared CWE-77

References