| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.7 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as critical, has been found in Barracuda Firewall up to 6.1.0.016. Affected by this issue is some unknown functionality. This manipulation causes privileges management. There is no exploit available. It is recommended to apply a patch to fix this issue.
Details
A vulnerability was found in Barracuda Firewall up to 6.1.0.016 (Firewall Software). It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation with an unknown input leads to a privileges management vulnerability. The CWE definition for the vulnerability is CWE-269. The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. As an impact it is known to affect integrity, and availability.
The weakness was shared 05/22/2014 with Barracuda as Resolved issue with Barracuda Firewall which could allow information disclosure and unauthorized access as confirmed release notes (Website). It is possible to read the advisory at barracuda.com. The vendor cooperated in the coordination of the public release. The attack can be launched remotely. The exploitation doesn't need any form of authentication. The technical details are unknown and an exploit is not publicly available. The attack technique deployed by this issue is T1068 according to MITRE ATT&CK.
Applying a patch is able to eliminate this problem. A possible mitigation has been published before and not just after the disclosure of the vulnerability. The release notes contains the following remark:
On May 19, 2014, we released security definition 2.1.12665 to address a vulnerability that could allow a user to remove directories from the Barracuda Firewall file system under certain circumstances.
The vulnerability is also documented in the databases at X-Force (93453) and SecurityFocus (BID 67599†). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.barracuda.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 5.7
VulDB Base Score: 6.5
VulDB Temp Score: 5.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Privileges managementCWE: CWE-269 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Timeline
05/19/2014 🔍05/22/2014 🔍
05/22/2014 🔍
05/30/2014 🔍
04/02/2019 🔍
Sources
Vendor: barracuda.comAdvisory: Resolved issue with Barracuda Firewall which could allow information disclosure and unauthorized access
Organization: Barracuda
Status: Confirmed
Coordinated: 🔍
GCVE (VulDB): GCVE-100-13399
X-Force: 93453 - Barracuda Firewall security bypass, Medium Risk
SecurityFocus: 67599 - Barracuda Firewall Security Bypass Vulnerability
Entry
Created: 05/30/2014 12:40Updated: 04/02/2019 16:08
Changes: 05/30/2014 12:40 (44), 04/02/2019 16:08 (9)
Complete: 🔍
Cache ID: 216:1C9:103
No comments yet. Languages: en.
Please log in to comment.