Vulnerability Description
A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bitdefender | Box 2 Firmware | 2.1.47.42 |
| Bitdefender | Box 2 | - |
Related Weaknesses (CWE)
References
- https://www.bitdefender.com/support/security-advisories/command-injection-vulnerBroken Link
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0919ExploitThird Party Advisory
- https://www.cybersecurity-help.cz/vdb/SB2020012215?affChecked=1Third Party Advisory
- https://www.bitdefender.com/support/security-advisories/command-injection-vulnerBroken Link
FAQ
What is CVE-2019-17095?
CVE-2019-17095 is a vulnerability with a CVSS score of 8.1 (HIGH). A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the productio...
How severe is CVE-2019-17095?
CVE-2019-17095 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-17095?
Check the references section above for vendor advisories and patch information. Affected products include: Bitdefender Box 2 Firmware, Bitdefender Box 2.