CVE-2025-34394
📋 TL;DR
Barracuda Service Center in the RMM solution prior to version 2025.1.1 exposes a .NET Remoting service that allows deserialization of arbitrary types, enabling remote attackers to execute arbitrary code. This affects organizations using Barracuda's RMM solution for remote monitoring and management. The vulnerability is remotely exploitable without authentication.
💻 Affected Systems
- Barracuda RMM (Remote Monitoring and Management) Service Center
📦 What is this software?
Rmm by Barracuda
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise allowing attacker to install malware, steal credentials, pivot to other systems, and maintain persistent access to the network.
Likely Case
Remote code execution leading to data theft, ransomware deployment, or unauthorized access to managed endpoints.
If Mitigated
Limited impact if network segmentation isolates the RMM server and strict access controls are in place.
🎯 Exploit Status
Deserialization vulnerabilities in .NET Remoting are well-understood attack vectors with existing exploitation frameworks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2025.1.1
Vendor Advisory: https://download.mw-rmm.barracudamsp.com/PDF/2025.1.1/RN_BRMM_2025.1.1_EN.pdf
Restart Required: Yes
Instructions:
1. Download Barracuda RMM version 2025.1.1 from the vendor portal. 2. Backup current configuration. 3. Run the installer to upgrade. 4. Restart the Barracuda Service Center service.
🔧 Temporary Workarounds
Disable .NET Remoting Service
windowsDisable the vulnerable .NET Remoting endpoint if not required for functionality.
Stop-Service -Name "Barracuda Service Center"
Modify configuration to disable .NET Remoting endpoint
Network Segmentation
windowsRestrict network access to the Barracuda Service Center port (default 9000) using firewall rules.
New-NetFirewallRule -DisplayName "Block Barracuda RMM" -Direction Inbound -LocalPort 9000 -Protocol TCP -Action Block
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the Barracuda RMM server from other critical systems.
- Monitor network traffic to the Barracuda Service Center port (default 9000) for suspicious activity.
🔍 How to Verify
Check if Vulnerable:
Check Barracuda RMM version in the administration console or via the installed program version. Versions below 2025.1.1 are vulnerable.
Check Version:
Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Barracuda RMM*"} | Select-Object Name, Version
Verify Fix Applied:
Verify the version shows 2025.1.1 or higher in the administration console and test that .NET Remoting functionality still works if required.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from Barracuda Service Center
- Failed authentication attempts to the .NET Remoting service
- Abnormal network connections from the RMM server
Network Indicators:
- Suspicious traffic to port 9000 (default .NET Remoting port) from unexpected sources
- Unusual outbound connections from the RMM server
SIEM Query:
source="Barracuda RMM" AND (event_id=4688 OR process_name="powershell.exe" OR process_name="cmd.exe")