CVE-2023-2868

CVE Published 2023-05-24
Related CWE(s) CWE-20: Improper Input Validation, CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
Related Vendor(s) barracuda
Related Product(s) email_security_gateway_900_firmware, email_security_gateway_600_firmware, email_security_gateway_300_firmware, email_security_gateway_400_firmware, email_security_gateway_800_firmware
Exploitation Reported (CISA KEV) 2023-05-26
CVSS 3 Base Score 9.4 (CRITICAL)
CVSS 3 Attack Complexity LOW
CVSS 3 Attack Vector NETWORK

A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.

Cyber Threat Graph Context

Explore how this CVE relates to the wider threat graph

Threat Reports Related to CVE-2023-2868

Report

North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs

This cybersecurity advisory from the U.S. Federal Bureau of Investigation (FBI) and its partners, highlights the cyber espionage activities of the ...

Report

We're All in this Together - A Year in Review of Zero-Days Exploited In-the-Wild in 2023

This report from Mandiant and Google Threat Analysis Group (TAG) presents combined analysis of zero day vulnerability exploitation in 2023. The ...

Associated CAPEC Patterns

References