CVE-2025-34393
BaseFortify
Publication date: 2025-12-10
Last updated on: 2025-12-10
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| barracuda | rmm_solution | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-470 | The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Barracuda Service Center within the RMM solution versions prior to 2025.1.1. It occurs because the software does not properly verify the name of an attacker-controlled WSDL service, which leads to insecure reflection. This flaw can allow an attacker to execute remote code by invoking arbitrary methods or deserializing untrusted types.
How can this vulnerability impact me? :
The vulnerability can lead to remote code execution on the affected system without any user interaction or privileges required. This means an attacker could potentially take full control of the system, execute arbitrary code, and compromise the confidentiality, integrity, and availability of the affected environment.