First published: Sun Dec 24 2023(Updated: )
Use of a Third Party library produced a vulnerability in Barracuda Networks Inc. Barracuda ESG Appliance which allowed Parameter Injection.This issue affected Barracuda ESG Appliance, from 5.1.3.001 through 9.2.1.001, until Barracuda removed the vulnerable logic.
Credit: mandiant-cve@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Barracuda Email Security Gateway 300 | >=5.1.3.001<=9.2.1.001 | |
Barracuda Email Security Gateway 300 Firmware | ||
All of | ||
Barracuda Email Security Gateway | >=5.1.3.001<=9.2.1.001 | |
Barracuda Email Security Gateway 400 Firmware | ||
All of | ||
Barracuda Email Security Gateway | >=5.1.3.001<=9.2.1.001 | |
Barracuda Email Security Gateway | ||
All of | ||
Barracuda Email Security Gateway | >=5.1.3.001<=9.2.1.001 | |
Barracuda Email Security Gateway 800 Firmware | ||
All of | ||
Barracuda Email Security Gateway | >=5.1.3.001<=9.2.1.001 | |
Barracuda Email Security Gateway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-7102 has a medium severity due to its potential for parameter injection in Barracuda ESG Appliances.
To fix CVE-2023-7102, upgrade your Barracuda ESG Appliance to the latest firmware version that removes the vulnerable logic.
CVE-2023-7102 affects Barracuda ESG Appliance versions from 5.1.3.001 to 9.2.1.001.
CVE-2023-7102 introduces a parameter injection vulnerability through the use of a third-party library.
Users of Barracuda ESG Appliances, specifically versions 5.1.3.001 through 9.2.1.001, are affected by CVE-2023-7102.