Exploit found in some Barracuda firewalls, VPN hardware
According to Austrian security researchers <a href="http://macnn.com/rd/278000==https://www.sec-consult.com/en/Vulnerability-Lab.htm" rel='nofollow'>SEC Consult Vulnerability Lab</a>, an assortment of firewall, spam filtering, and VPN hardware made by Barracuda contain undocumented accounts that allow hackers to remotely log into the devices and access information. The SSH backdoor is hardcoded into the products, and can be used to gain shell access to the equipment, according to the published advisory.<br />
The researchers claim that the security flaw "is entirely undocumented and can only be disabled via a hidden 'expert options' dialog." A very weak password which <em>Electronista</em> found with a Google search is used to secure the device in conjunction with a generic user name. The combination allows login and full remote access to the device's MySQL database. The exploits are accessible by a small range of IP addresses -- many of which don't belong to Barracuda but can be spoofed with the right software attack in any event. The exploit has possibly existed since 2003.
On Wednesday, Barracuda issued its own "medium"-level <a href="http://macnn.com/rd/278001==https://www.barracudanetworks.com/support/techalerts" rel='nofollow'>security advisory</a>, saying that "research has confirmed that an attacker with specific internal knowledge of the Barracuda appliances may be able to remotely log in to a non-privileged account on the appliance from a small set of IP addresses" They called the vulnerabilities the result of "default firewall configuration and default user accounts on the unit" and have issued firmware updates to patch the issue.
|All times are GMT -4. The time now is 01:03 AM.||
Copyright © 2005-2007 MacNN. All rights reserved.
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2016, vBulletin Solutions, Inc.