CVE-2025-34392

9.8 CRITICAL

📋 TL;DR

This vulnerability in Barracuda Service Center allows attackers to upload malicious WSDL files that bypass URL validation, leading to arbitrary file writes and remote code execution via webshells. It affects all Barracuda RMM Service Center installations running versions prior to 2025.1.1. Organizations using Barracuda's RMM solution for managed service provider operations are at risk.

💻 Affected Systems

Products:
  • Barracuda RMM Service Center
Versions: All versions prior to 2025.1.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the core RMM management component used by MSPs to manage client endpoints.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining persistent remote access, data exfiltration, lateral movement across managed endpoints, and complete control over the RMM infrastructure.

🟠

Likely Case

Attackers deploy webshells to execute arbitrary commands, install malware, steal credentials, and pivot to managed client systems through the RMM platform.

🟢

If Mitigated

Limited impact with proper network segmentation, but still potential for initial foothold in the RMM management plane.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Detailed technical analysis and exploitation methodology published by WatchTowr Labs. The vulnerability leverages SOAP/WSDL processing flaws in .NET Framework applications.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.1.1

Vendor Advisory: https://download.mw-rmm.barracudamsp.com/PDF/2025.1.1/RN_BRMM_2025.1.1_EN.pdf

Restart Required: Yes

Instructions:

1. Download Barracuda RMM version 2025.1.1 from official sources. 2. Backup current configuration and databases. 3. Run the installer with administrative privileges. 4. Restart the Barracuda Service Center service. 5. Verify successful update through the management console.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Barracuda Service Center to only trusted management IP addresses

WSDL Processing Disable

windows

Disable automatic WSDL processing if not required for functionality

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Barracuda RMM from internet and untrusted networks
  • Deploy web application firewall (WAF) rules to block suspicious SOAP/WSDL requests and file upload patterns

🔍 How to Verify

Check if Vulnerable:

Check Barracuda Service Center version in the management console under Help > About. If version is below 2025.1.1, the system is vulnerable.

Check Version:

Check the Barracuda Service Center web interface or examine installed programs in Windows Control Panel.

Verify Fix Applied:

Confirm version shows 2025.1.1 or higher in the management console. Test WSDL processing with controlled test files to ensure URL validation is enforced.

📡 Detection & Monitoring

Log Indicators:

  • Unusual WSDL file uploads
  • SOAP requests with external URLs
  • Webshell file creation in web directories
  • Unusual process execution from web server context

Network Indicators:

  • HTTP POST requests with WSDL content to Barracuda Service Center endpoints
  • Outbound connections from Barracuda server to unexpected external IPs

SIEM Query:

source="barracuda-rmm" AND (event_type="file_upload" AND file_extension="wsdl") OR (process_name="w3wp.exe" AND command_line CONTAINS "powershell" OR "cmd")

🔗 References

📤 Share & Export