7.2

CVE-2023-26213

Exploit
On Barracuda CloudGen WAN Private Edge Gateway devices before 8 webui-sdwan-1089-8.3.1-174141891, an OS command injection vulnerability exists in /ajax/update_certificate - a crafted HTTP request allows an authenticated attacker to execute arbitrary commands. For example, a name field can contain :password and a password field can contain shell metacharacters.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
BarracudaT100b Firmware Version8.3.1 Update-
   BarracudaT100b Version-
BarracudaT200c Firmware Version8.3.1 Update-
   BarracudaT200c Version-
BarracudaT400c Firmware Version8.3.1 Update-
   BarracudaT400c Version-
BarracudaT600d Firmware Version8.3.1 Update-
   BarracudaT600d Version-
BarracudaT900b Firmware Version8.3.1 Update-
   BarracudaT900b Version-
BarracudaT93a Firmware Version8.3.1 Update-
   BarracudaT93a Version-
BarracudaT193a Firmware Version8.3.1 Update-
   BarracudaT193a Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 4.85% 0.892
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.