← Back to CVEs
CVE-2025-34392
CRITICAL9.8
Description
Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, does not verify the URL defined in an attacker-controlled WSDL that is later loaded by the application. This can lead to arbitrary file write and remote code execution via webshell upload.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published12/10/2025
Last Modified12/23/2025
Sourcenvd
Honeypot Sightings0
Affected Products
barracuda:rmm
Weaknesses (CWE)
CWE-36
References
https://download.mw-rmm.barracudamsp.com/PDF/2025.1.1/RN_BRMM_2025.1.1_EN.pdf(disclosure@vulncheck.com)
https://labs.watchtowr.com/soapwn-pwning-net-framework-applications-through-http-client-proxies-and-wsdl/(disclosure@vulncheck.com)
https://www.barracuda.com/products/msp/network-protection/rmm(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/barracuda-rmm-service-center-absolute-path-traversal-rce(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.