{ "id": "CVE-2023-26213", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T22:15:09.840", "lastModified": "2023-03-10T14:53:13.973", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "On Barracuda CloudGen WAN Private Edge Gateway devices before 8 webui-sdwan-1089-8.3.1-174141891, an OS command injection vulnerability exists in /ajax/update_certificate - a crafted HTTP request allows an authenticated attacker to execute arbitrary commands. For example, a name field can contain :password and a password field can contain shell metacharacters." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 1.2, "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-78" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:barracuda:t100b_firmware:8.3.1:-:*:*:*:*:*:*", "matchCriteriaId": "396AC132-60C1-4148-A751-5EB8CD95666F" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:barracuda:t100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF643D7C-722D-4756-A170-B9B6CF8C3368" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:barracuda:t200c_firmware:8.3.1:-:*:*:*:*:*:*", "matchCriteriaId": "5165FF77-16A9-43E9-9F50-16F15858620D" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:barracuda:t200c:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A7A1511-0858-40EA-869D-AD212B30BDF2" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:barracuda:t400c_firmware:8.3.1:-:*:*:*:*:*:*", "matchCriteriaId": "95DA502F-971B-4F29-B41C-6AF16BAA3AF3" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:barracuda:t400c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DA2099D-D1E5-4F3B-A207-3E1A886E911D" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:barracuda:t600d_firmware:8.3.1:-:*:*:*:*:*:*", "matchCriteriaId": "46C4BE5C-2F6F-44AE-A337-9D85C7FFCC17" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:barracuda:t600d:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0915A13-9562-4299-B7F0-F8FDD4B813D2" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:barracuda:t900b_firmware:8.3.1:-:*:*:*:*:*:*", "matchCriteriaId": "EFF3DFD7-57B7-4926-B146-8EF396E78DB2" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:barracuda:t900b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4321174A-F14C-490C-9B92-850FBAA7EABE" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:barracuda:t93a_firmware:8.3.1:-:*:*:*:*:*:*", "matchCriteriaId": "7D833BB2-70BC-4EEC-8EEF-332E3CEE7387" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:barracuda:t93a:-:*:*:*:*:*:*:*", "matchCriteriaId": "90093740-56A6-4E49-BFFC-5039CDE95877" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:barracuda:t193a_firmware:8.3.1:-:*:*:*:*:*:*", "matchCriteriaId": "202C1DB3-9EDC-4560-AE26-62E0667AFA41" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:barracuda:t193a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE8BBEB-FDA3-4616-A79E-989AD852F221" } ] } ] } ], "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Mar/2", "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ] }, { "url": "https://campus.barracuda.com/product/cloudgenwan/doc/96024723/release-notes-8-3-1/", "source": "cve@mitre.org", "tags": [ "Release Notes" ] }, { "url": "https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://www.barracuda.com/products/network-security/cloudgen-wan", "source": "cve@mitre.org", "tags": [ "Product" ] } ] }