Barracuda Firewall up to 2.0.5 Default Account Login Account backdoor
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.8 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in Barracuda Firewall up to 2.0.5 and classified as critical. This issue affects some unknown processing of the component Default Account. The manipulation with the input root/build/shutdown/product/ca/support/websupport/qa_test as part of Login Account leads to backdoor.
The attack can be initiated remotely. Additionally, an exploit exists.
The affected component should be upgraded.
Details
A vulnerability was found in Barracuda Firewall up to 2.0.5 (Firewall Software). It has been rated as critical. This issue affects an unknown part of the component Default Account. The manipulation with the input value root/build/shutdown/product/ca/support/websupport/qa_test leads to a backdoor vulnerability. Using CWE to declare the problem leads to CWE-912. The product contains functionality that is not documented, not part of the specification, and not accessible through an interface or command sequence that is obvious to the product's users or administrators. Impacted is confidentiality, integrity, and availability.
The bug was discovered 11/20/2012. The weakness was released 01/24/2013 by Stefan Viehböck with SEC Consult Vulnerability Lab as 20130124-0 as confirmed advisory (Website). It is possible to read the advisory at sec-consult.com. The public release was coordinated with Barracuda. The exploitation is known to be easy. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details as well as a public exploit are known. The attack technique deployed by this issue is T1588.001 according to MITRE ATT&CK. Several undocumented operating system user accounts exist on the appliance. They can be used to gain access to the appliance via the terminal but also via SSH.
A public exploit has been developed by Stefan Viehböck and been published immediately after the advisory. The exploit is available at sec-consult.com. It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 64 days. During that time the estimated underground price was around $0-$5k. The vulnerability scanner Nessus provides a plugin with the ID 64258 (Barracuda Appliances Default Credentials), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Gain a shell remotely and running in the context r. Furthermore it was possible to enable diagnostic/debugging functionality which could be used to gain root access on the system.
Upgrading to version Security Definition 2.0.5 eliminates this vulnerability. It is possible to mitigate the problem by applying the configuration setting Disable sshd (expert option).Addressing this vulnerability is possible by firewalling tcp/22 (ssh). The problem might be mitigated by replacing the product with Checkpoint Firewall-1, Juniper, Cisco PIX, ASA or … as an alternative. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published before and not just after the disclosure of the vulnerability. These accounts are undocumented and can not be disabled. An upgrade will change the sshd config to only allow logins from the following users: cluster (login with pubic/private key), remote (login with pubic/private key, Barracuda Networks is in possession of the corresponding private key), root (login with password, password hash (listed above) might be crackable depending on password strength). According to Barracuda Networks these accounts are essential for customer support and will not be removed.
The vulnerability is also documented in the databases at Tenable (64258), SecurityFocus (BID 57537†), OSVDB (89519†) and SecurityTracker (ID 1028038†). krebsonsecurity.com is providing further details. Entries connected to this vulnerability are available at VDB-7452 and VDB-7466. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.barracuda.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 8.8
VulDB Base Score: 9.8
VulDB Temp Score: 8.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: BackdoorCWE: CWE-912
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Author: Stefan Viehböck
Download: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 64258
Nessus Name: Barracuda Appliances Default Credentials
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exploit Delay Time: 🔍
Upgrade: Firewall Security Definition 2.0.5
Config: Disable sshd (expert option)
Firewalling: 🔍
Alternative: Checkpoint Firewall-1/Juniper/Cisco PIX/ASA/…
Timeline
11/20/2012 🔍11/29/2012 🔍
01/23/2013 🔍
01/23/2013 🔍
01/24/2013 🔍
01/24/2013 🔍
01/24/2013 🔍
01/24/2013 🔍
01/24/2013 🔍
04/22/2021 🔍
Sources
Vendor: barracuda.comAdvisory: 20130124-0
Researcher: Stefan Viehböck
Organization: SEC Consult Vulnerability Lab
Status: Confirmed
Confirmation: 🔍
Coordinated: 🔍
GCVE (VulDB): GCVE-100-7451
SecurityFocus: 57537 - Multiple Barracuda Products Security Bypass and Backdoor Unauthorized Access Vulnerabilities
OSVDB: 89519 - Barracuda Appliances Multiple Default Undocumented Credentials
SecurityTracker: 1028038 - Barracuda Web Filter SSH Backdoor Lets Remote Users Access the System
scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
See also: 🔍
Entry
Created: 01/24/2013 20:05Updated: 04/22/2021 13:49
Changes: 01/24/2013 20:05 (75), 08/09/2017 14:08 (13), 04/22/2021 13:49 (2)
Complete: 🔍
Cache ID: 216:FE6:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.