Barracuda appliances susceptible to backdoor access

Share this article:

A slew of products from security provider Barracuda Networks contain a backdoor that could enable outsiders to remotely access accounts and possibly steal information.

Austrian-based advisory firm SEC Consult privately reported the vulnerability to Barracuda in late November. Among the products affected are the Campbell, Calif.-based company's Spam and Virus Firewall, Web Application Firewall, Web Filter and SSL VPN.

On Wednesday, the research firm publicly released details about the threat after Barracuda issued an alert to customers.

According to researchers, there are two issues. First, the products contain "undocumented operating system user accounts," or backdoors. And second, these accounts can be accessed via SSH, or Secure Shell, a protocol that permits encrypted remote login and communication. The IP addresses that can access these appliances are meant to be limited to Barracuda, but that's not the case, according to researchers.

"The public [IP] ranges include servers run by Barracuda...but also servers from other, unaffiliated entities – all of whom can access SSH on all affected Barracuda Networks appliances exposed to the internet," the SEC Consult advisory said.

In its own advisory, Barracuda said the vulnerabilities have been resolved, and that customers should update their "security definitions" to the latest version.

"Our research has confirmed that an attacker with specific internal knowledge of the Barracuda appliances may be able to remotely log into a non-privileged account on the appliance from a small set of IP addresses," the advisory said. "The vulnerabilities are the result of the default firewall configuration and default user accounts on the unit."

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

ISSA tackles workforce gap with career lifecycle program

ISSA tackles workforce gap with career lifecycle program ...

On Thursday, the group launched its Cybersecurity Career Lifecycle (CSCL) program.

Amplification DDoS attacks most popular, according to Symantec

Amplification DDoS attacks most popular, according to Symantec

The company noted in a whitepaper released on Tuesday that Domain Name Server amplification attacks have increased 183 percent between January and August.

Court shutters NY co. selling security software with "no value"

A federal court shut down Pairsys at the request of the Federal Trade Commission.