CVE-2023-7102

9.8 CRITICAL

📋 TL;DR

This vulnerability in Barracuda ESG Appliances allows parameter injection through a third-party Perl library (Spreadsheet::ParseExcel). Attackers can exploit this to execute arbitrary code on affected appliances. Organizations using Barracuda ESG Appliances versions 5.1.3.001 through 9.2.1.001 are affected.

💻 Affected Systems

Products:
  • Barracuda ESG Appliance
Versions: 5.1.3.001 through 9.2.1.001
Operating Systems: Appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments within the affected version range are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete appliance compromise, data exfiltration, lateral movement into internal networks, and persistent backdoor installation.

🟠

Likely Case

Unauthenticated attackers achieving remote code execution to deploy malware, steal credentials, or use the appliance as a foothold for further attacks.

🟢

If Mitigated

Limited impact if network segmentation isolates the appliance and strict access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists and has been weaponized in real attacks. Exploitation requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 9.2.1.001 with vulnerable logic removed

Vendor Advisory: https://www.barracuda.com/company/legal/esg-vulnerability

Restart Required: Yes

Instructions:

1. Update Barracuda ESG Appliance to latest firmware version. 2. Reboot appliance after update. 3. Verify update completed successfully.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to ESG appliance management interfaces

Use firewall rules to limit access to trusted IPs only

🧯 If You Can't Patch

  • Immediately isolate the appliance from internet access and restrict to internal management networks only
  • Implement strict network monitoring and alerting for any unusual traffic to/from the appliance

🔍 How to Verify

Check if Vulnerable:

Check appliance firmware version via web interface or CLI. If version is between 5.1.3.001 and 9.2.1.001 inclusive, it is vulnerable.

Check Version:

ssh admin@esg-appliance 'show version' or check web admin interface

Verify Fix Applied:

Verify firmware version is above 9.2.1.001 and check vendor advisory for specific fixed versions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Perl process execution
  • Unexpected file creation in system directories
  • Suspicious network connections from appliance

Network Indicators:

  • Unexpected outbound connections from ESG appliance
  • Traffic to known malicious IPs from appliance

SIEM Query:

source="barracuda-esg" AND (process="perl" OR event="file_creation" OR dest_ip IN [threat_intel_feed])

🔗 References

📤 Share & Export