CVE-2025-34395

7.5 HIGH

📋 TL;DR

This vulnerability in Barracuda Service Center allows unauthenticated attackers to read arbitrary files via path traversal in a .NET Remoting service. By retrieving .NET machine keys, attackers can escalate this to remote code execution. Organizations using Barracuda RMM solutions with Service Center versions before 2025.1.1 are affected.

💻 Affected Systems

Products:
  • Barracuda Service Center (part of Barracuda RMM solution)
Versions: All versions prior to 2025.1.1
Operating Systems: Windows (as .NET Remoting is Windows-specific)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Service Center component of Barracuda RMM deployments. The vulnerability is in the .NET Remoting implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with remote code execution leading to data theft, ransomware deployment, or complete network takeover.

🟠

Likely Case

Unauthorized file access leading to credential harvesting, configuration theft, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with only file enumeration possible if network segmentation and access controls prevent exploitation.

🌐 Internet-Facing: HIGH - The .NET Remoting service is exposed and exploitable without authentication from internet-facing systems.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows unauthenticated attackers to read sensitive files and potentially execute code.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has clear path to RCE via machine key extraction, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.1.1

Vendor Advisory: https://download.mw-rmm.barracudamsp.com/PDF/2025.1.1/RN_BRMM_2025.1.1_EN.pdf

Restart Required: Yes

Instructions:

1. Download Barracuda RMM version 2025.1.1 from official sources. 2. Backup current configuration. 3. Install the update following vendor documentation. 4. Restart affected services/systems.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Barracuda Service Center to only trusted management networks

Firewall Rules

windows

Block external access to the .NET Remoting service port (default is often 9000-9001)

netsh advfirewall firewall add rule name="Block Barracuda Remoting" dir=in action=block protocol=TCP localport=9000,9001

🧯 If You Can't Patch

  • Isolate affected systems from internet and untrusted networks
  • Implement strict network segmentation and monitor for suspicious file access patterns

🔍 How to Verify

Check if Vulnerable:

Check Barracuda Service Center version in administration interface or via installed programs list

Check Version:

Check Control Panel > Programs and Features for Barracuda RMM version or consult service logs

Verify Fix Applied:

Confirm version is 2025.1.1 or later in administration interface

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in Service Center logs
  • Failed authentication attempts to .NET Remoting service
  • Unexpected process execution

Network Indicators:

  • Unusual traffic to .NET Remoting ports (9000-9001)
  • External connections to Service Center from untrusted sources

SIEM Query:

source="Barracuda Service Center" AND (event_type="file_access" OR event_type="remoting_call") AND (file_path CONTAINS ".." OR user="anonymous")

🔗 References

📤 Share & Export