First published: Fri Mar 03 2023(Updated: )
On Barracuda CloudGen WAN Private Edge Gateway devices before 8 webui-sdwan-1089-8.3.1-174141891, an OS command injection vulnerability exists in /ajax/update_certificate - a crafted HTTP request allows an authenticated attacker to execute arbitrary commands. For example, a name field can contain :password and a password field can contain shell metacharacters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Barracuda T100b Firmware | =8.3.1 | |
Barracuda T100b | ||
Barracuda T200c Firmware | =8.3.1 | |
Barracuda T200c | ||
Barracuda T400c Firmware | =8.3.1 | |
Barracuda T400c | ||
Barracuda T600d Firmware | =8.3.1 | |
Barracuda T600d | ||
Barracuda T900b Firmware | =8.3.1 | |
Barracuda T900b | ||
Barracuda T93a Firmware | =8.3.1 | |
Barracuda T93a | ||
Barracuda T193a Firmware | =8.3.1 | |
Barracuda T193a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-26213.
The severity of CVE-2023-26213 is high with a severity value of 7.2.
CVE-2023-26213 allows an authenticated attacker to execute arbitrary commands on Barracuda CloudGen WAN Private Edge Gateway devices before 8 webui-sdwan-1089-8.3.1-174141891.
To fix CVE-2023-26213, update the affected Barracuda CloudGen WAN Private Edge Gateway devices to version 8 webui-sdwan-1089-8.3.1-174141891 or later.
You can find more information about CVE-2023-26213 at the following references: [link1](http://seclists.org/fulldisclosure/2023/Mar/2), [link2](https://campus.barracuda.com/product/cloudgenwan/doc/96024723/release-notes-8-3-1/), [link3](https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/).