Description
An exploitable command execution vulnerability exists in the recovery partition of Bitdefender BOX 2, version 2.0.1.91. The API method `/api/update_setup` does not perform firmware signature checks atomically, leading to an exploitable race condition (TOCTTOU) that allows arbitrary execution of system commands. This issue affects: Bitdefender Bitdefender BOX 2 versions prior to 2.1.47.36.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
Vendor Solution
Updating to firmware version 2.1.47.36 resolves this issue.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-7568 | An exploitable command execution vulnerability exists in the recovery partition of Bitdefender BOX 2, version 2.0.1.91. The API method `/api/update_setup` does not perform firmware signature checks atomically, leading to an exploitable race condition (TOCTTOU) that allows arbitrary execution of system commands. This issue affects: Bitdefender Bitdefender BOX 2 versions prior to 2.1.47.36. |
References
History
No history.
Status: PUBLISHED
Assigner: Bitdefender
Published:
Updated: 2024-09-17T03:59:40.500Z
Reserved: 2019-10-02T00:00:00.000Z
Link: CVE-2019-17102
No data.
Status : Modified
Published: 2020-01-27T14:15:10.997
Modified: 2024-11-21T04:31:41.760
Link: CVE-2019-17102
No data.
OpenCVE Enrichment
No data.
EUVD