CVE-2019-17095
Bitdefender BOX 2 bootstrap download_image command injection vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability.
Se ha detectado una vulnerabilidad de inyección de comandos en la etapa de arranque de Bitdefender BOX 2, versiones 2.1.47.42 y 2.1.53.45. El método de la API "/api/download_image" maneja de manera no segura la URL de firmware de producción suministrada por servidores remotos, conllevando a una ejecución arbitraria de comandos de sistema. A fin de explotar la condición, un atacante no autenticado debe hacerse pasar por un servidor de infraestructura para desencadenar esta vulnerabilidad.
The Bitdefender parsing engine supports the BZIP archive format. The parsing engine can be bypassed by specifically manipulating an BZIP archive so that it can be accessed by an end-user but not the antivirus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. Many Bitdefender products are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-10-02 CVE Reserved
- 2020-01-06 CVE Published
- 2020-02-01 First Exploit
- 2024-09-17 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://www.bitdefender.com/support/security-advisories/command-injection-vulnerability-in-bitdefender-box-v2-va-5706 | Broken Link | |
https://www.cybersecurity-help.cz/vdb/SB2020012215?affChecked=1 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0919 | 2020-02-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Bitdefender Search vendor "Bitdefender" | Box 2 Firmware Search vendor "Bitdefender" for product "Box 2 Firmware" | 2.1.47.42 Search vendor "Bitdefender" for product "Box 2 Firmware" and version "2.1.47.42" | - |
Affected
| in | Bitdefender Search vendor "Bitdefender" | Box 2 Search vendor "Bitdefender" for product "Box 2" | - | - |
Safe
|
Bitdefender Search vendor "Bitdefender" | Box 2 Firmware Search vendor "Bitdefender" for product "Box 2 Firmware" | 2.1.53.45 Search vendor "Bitdefender" for product "Box 2 Firmware" and version "2.1.53.45" | - |
Affected
| in | Bitdefender Search vendor "Bitdefender" | Box 2 Search vendor "Bitdefender" for product "Box 2" | - | - |
Safe
|