Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Firewall)  >   Barracuda Web Application Firewall Vendors:   Barracuda Networks
Barracuda Web Application Firewall SSH Backdoor Lets Remote Users Access the System
SecurityTracker Alert ID:  1028037
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jan 24 2013
Impact:   User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): prior to Security Definition 2.0.5
Description:   A vulnerability was reported in Barracuda Web Application Firewall. A remote user can gain access to the target system.

The system includes several undocumented SSH user accounts that cannot be disabled and can be accessed from certain whitelisted IP ranges. At least one account can be exploited to gain shell access on the target device.

The SSH user account names are:


The following IP ranges are whitelisted:

The vendor was notified on Nov 29, 2012.

The original advisory is available at:

S. Viehbock of SEC Consult reported this vulnerability.

Impact:   A remote user can gain access to the target system.
Solution:   The vendor has issued a fix (Security Definition 2.0.5).

The fix retains several user accounts for support purposes. The vendor reportedly offers a special option (via customer support) that disables the SSH daemon.

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Configuration error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC