CVE-2025-34393
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-10

Last updated on: 2025-12-10

Assigner: VulnCheck

Description
Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, does not correctly verify the name of an attacker-controlled WSDL service, leading to insecure reflection. This can result in remote code execution through either invocation of arbitrary methods or deserialization of untrusted types.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-10
Last Modified
2025-12-10
Generated
2026-05-09
AI Q&A
2025-12-10
EPSS Evaluated
2026-05-07
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
barracuda rmm_solution *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-470 The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Barracuda Service Center within the RMM solution versions prior to 2025.1.1. It occurs because the software does not properly verify the name of an attacker-controlled WSDL service, which leads to insecure reflection. This flaw can allow an attacker to execute remote code by invoking arbitrary methods or deserializing untrusted types.


How can this vulnerability impact me? :

The vulnerability can lead to remote code execution on the affected system without any user interaction or privileges required. This means an attacker could potentially take full control of the system, execute arbitrary code, and compromise the confidentiality, integrity, and availability of the affected environment.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart