CVE-2023-26213
📋 TL;DR
This CVE describes an OS command injection vulnerability in Barracuda CloudGen WAN Private Edge Gateway devices. Authenticated attackers can execute arbitrary commands via crafted HTTP requests to the /ajax/update_certificate endpoint. Organizations using affected versions of these networking devices are at risk.
💻 Affected Systems
- Barracuda CloudGen WAN Private Edge Gateway
📦 What is this software?
T100b Firmware by Barracuda
T193a Firmware by Barracuda
T200c Firmware by Barracuda
T400c Firmware by Barracuda
T600d Firmware by Barracuda
T900b Firmware by Barracuda
T93a Firmware by Barracuda
⚠️ Risk & Real-World Impact
Worst Case
Full device compromise leading to network pivoting, data exfiltration, ransomware deployment, or persistent backdoor installation across the entire network infrastructure.
Likely Case
Unauthorized administrative access to the device, configuration changes, credential harvesting, and lateral movement within the network.
If Mitigated
Limited impact due to network segmentation, strong authentication controls, and restricted administrative access preventing exploitation attempts.
🎯 Exploit Status
Exploit details are publicly available in security advisories. The vulnerability requires authentication but has low technical complexity to exploit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8 webui-sdwan-1089-8.3.1-174141891 or later
Vendor Advisory: https://campus.barracuda.com/product/cloudgenwan/doc/96024723/release-notes-8-3-1/
Restart Required: Yes
Instructions:
1. Log into the Barracuda CloudGen WAN management portal. 2. Navigate to device management. 3. Check for available firmware updates. 4. Apply update 8.3.1-174141891 or later. 5. Reboot the device after update completion.
🔧 Temporary Workarounds
Restrict Administrative Access
allLimit access to the web UI to only trusted IP addresses and require multi-factor authentication.
Network Segmentation
allIsolate the management interface from general network traffic and implement strict firewall rules.
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach the device's management interface
- Monitor for suspicious activity including unusual HTTP requests to /ajax/update_certificate endpoint
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via web UI or CLI. If version is earlier than 8.3.1-174141891, the device is vulnerable.
Check Version:
Login to device web UI and check System > Status > Firmware Version, or use CLI command 'show version'
Verify Fix Applied:
Confirm firmware version is 8.3.1-174141891 or later after applying the update.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /ajax/update_certificate with shell metacharacters in parameters
- Unusual command execution in system logs
- Multiple failed authentication attempts followed by successful login
Network Indicators:
- Unusual outbound connections from the device
- Traffic patterns inconsistent with normal device operation
SIEM Query:
source="barracuda_firewall" AND (url="/ajax/update_certificate" AND (param="password" OR param="name") AND value MATCHES "[;|&`$()]+")
🔗 References
- http://seclists.org/fulldisclosure/2023/Mar/2
- https://campus.barracuda.com/product/cloudgenwan/doc/96024723/release-notes-8-3-1/
- https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/
- https://www.barracuda.com/products/network-security/cloudgen-wan
- http://seclists.org/fulldisclosure/2023/Mar/2
- https://campus.barracuda.com/product/cloudgenwan/doc/96024723/release-notes-8-3-1/
- https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/
- https://www.barracuda.com/products/network-security/cloudgen-wan