First published: Fri Aug 11 2006(Updated: )
Barracuda Spam Firewall (BSF), possibly 3.3.03.053, contains a hardcoded password for the admin account for logins from 127.0.0.1 (localhost), which allows local users to gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Barracuda Spam Firewall | =3.3.03.053 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4082 is considered a high severity vulnerability due to the presence of a hardcoded password allowing local privilege escalation.
To fix CVE-2006-4082, it is recommended to update to a newer version of Barracuda Spam Firewall that does not contain the hardcoded password.
CVE-2006-4082 affects Barracuda Spam Firewall version 3.3.03.053.
CVE-2006-4082 can only be exploited locally since the hardcoded password is accessible only to users on the localhost.
CVE-2006-4082 allows unauthorized local users to gain elevated privileges, which can compromise the entire system's security.