CVE-2023-7102
CRITICAL EXPLOITED IN THE WILDBarracuda ESG Appliance <9.2.1.001 - Parameter Injection
Title source: llmDescription
Use of a Third Party library produced a vulnerability in Barracuda Networks Inc. Barracuda ESG Appliance which allowed Parameter Injection.This issue affected Barracuda ESG Appliance, from 5.1.3.001 through 9.2.1.001, until Barracuda removed the vulnerable logic.
References (6)
Core 6
Core References
Third Party Advisory
https://github.com/haile01/perl_spreadsheet_excel_rce_poc
Third Party Advisory
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md
Vendor Advisory
https://www.barracuda.com/company/legal/esg-vulnerability
Third Party Advisory
https://www.cve.org/CVERecord?id=CVE-2023-7101
Scores
CVSS v3
9.8
EPSS
0.0891
EPSS Percentile
92.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2023-12-24
InTheWild.io
2023-12-27
CWE
CWE-1104
Status
published
Products (5)
barracuda/email_security_gateway_300_firmware
5.1.3.001 - 9.2.1.001
barracuda/email_security_gateway_400_firmware
5.1.3.001 - 9.2.1.001
barracuda/email_security_gateway_600_firmware
5.1.3.001 - 9.2.1.001
barracuda/email_security_gateway_800_firmware
5.1.3.001 - 9.2.1.001
barracuda/email_security_gateway_900_firmware
5.1.3.001 - 9.2.1.001
Published
Dec 24, 2023
Tracked Since
Feb 18, 2026