{"id":22125,"date":"2023-05-30T16:10:05","date_gmt":"2023-05-31T00:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/05\/30\/news-15855\/"},"modified":"2023-05-30T16:10:05","modified_gmt":"2023-05-31T00:10:05","slug":"news-15855","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/05\/30\/news-15855\/","title":{"rendered":"Barracuda Networks patches zero-day vulnerability in Email Security Gateway"},"content":{"rendered":"<p>On May 20, Barracuda Networks issued a patch for a zero day&nbsp;<a href=\"https:\/\/www.barracuda.com\/company\/legal\/esg-vulnerability\" target=\"_blank\" rel=\"nofollow\">vulnerability in its Email Security Gateway<\/a> (ESG) appliance. The vulnerability existed in a module which initially screens the attachments of incoming emails, and was discovered on May 19.<\/p>\n<p>Barracuda&#8217;s investigation showed that the vulnerability resulted in unauthorized access to a subset of email gateway appliances.&nbsp;A remote unauthenticated attacker could&nbsp;send a specially crafted archive to the appliance and execute arbitrary Perl commands on the target system. The affected versions of ESG are 5.1.3 &#8211; 9.2.<\/p>\n<p>Consequently a security patch to eliminate the vulnerability was applied to all ESG appliances worldwide on Saturday, May 20. After further investigation a second patch was sent out on May 21, 2023.<\/p>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The CVE patched in these updates is:<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-2868\" target=\"_blank\" rel=\"nofollow\">CVE-2023-2868<\/a>: <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2020\/05\/how-cvss-works-characterizing-and-scoring-vulnerabilities\">CVSS score<\/a> 9.4 out of 10. A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only). The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker&nbsp;could specifically format these file names in a particular manner that will result in remotely executing a system command through Perl&#8217;s qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.<\/p>\n<p>Barracuda says users whose appliances are believed to be impacted have been notified via the ESG user interface about the actions they need to take.&nbsp;It says it&nbsp;has also reached out to these specific customers. Updates will be posted to the <a href=\"https:\/\/status.barracuda.com\/\" target=\"_blank\" rel=\"nofollow\">product status page<\/a>.<\/p>\n<p>The Cybersecurity &amp; Infrastructure Security Agency (CISA) has added the vulnerability to its&nbsp;<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" title=\"Known Exploited Vulnerabilities Catalog\" target=\"_blank\" rel=\"nofollow\">Known Exploited Vulnerabilities Catalog<\/a>, based on evidence of active exploitation. The due date for FCEB agencies for this vulnerability is June 16, 2023. CISA also <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2023\/05\/26\/cisa-adds-one-known-exploited-vulnerability-catalog\">warned<\/a> that these types of vulnerabilities are frequent attack vectors for malicious cyberactors and pose a significant risks to the federal enterprise.<\/p>\n<hr \/>\n<p><strong>We don&rsquo;t just report on vulnerabilities&mdash;we identify them, and prioritize action.<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using <a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">Malwarebytes Vulnerability and Patch Management<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/05\/barracuda-networks-patches-zero-day-vulnerability-in-email-security-gateway\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/exploits-and-vulnerabilities\" rel=\"category tag\">Exploits and vulnerabilities<\/a><\/p>\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Barracuda Networks issued a patch for a zero-day vulnerability in its Email Security Gateway that was actively being exploited<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/05\/barracuda-networks-patches-zero-day-vulnerability-in-email-security-gateway\" title=\"Barracuda Networks patches zero-day vulnerability in Email Security Gateway\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/05\/barracuda-networks-patches-zero-day-vulnerability-in-email-security-gateway\">Barracuda Networks patches zero-day vulnerability in Email Security Gateway<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[22783,32],"class_list":["post-22125","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-exploits-and-vulnerabilities","tag-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22125"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22125\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22125"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}