Chinese Hackers Exploited New Zero-Day in Barracuda's ESG Appliances

Barracuda has revealed that Chinese threat actors exploited a new zero-day in its Email Security Gateway (ESG) appliances to deploy backdoors on a "limited number" of devices.

Tracked as CVE-2023-7102, the issue relates to a case of arbitrary code execution that resides within a third-party and open-source library named Spreadsheet::ParseExcel that's used by the Amavis scanner within the gateway. Successful exploitation of the new flaw is accomplished by means of a specially crafted Microsoft Excel email attachment.

Spreadsheet::ParseExcel is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.

Barracuda said it released a security update that has been "automatically applied" on December 21, 2023, and that no further customer action is required.

Source: Barracuda Email Security Gateway Appliance (ESG) Advisory

Tags: #CyberSecurity #ZeroDayExploit #BarracudaESG #CVE-2023-7102 #EmailSecurity #Barracuda 🚨

Barracuda Email Security Gateway Appliance (ESG) Vulnerability

Barracuda Networks
JPCERT/CC issued an alert to users in Japan, introducing an additional investigation report by Mandiant and related information from the FBI. #BarracudaESG #cve_2023_2868 #infosec #vulnerability
(Japanese only)
https://www.jpcert.or.jp/at/2023/at230017.html
Barracuda Email Security Gateway(ESG)の脆弱性(CVE-2023-2868)を悪用する継続的な攻撃活動に関する注意喚起

JPCERT/CC
US govt email servers hacked in Barracuda zero-day attacks

Suspected Chinese hackers disproportionately targeted and breached government and government-linked organizations worldwide in recent attacks targeting a Barracuda Email Security Gateway (ESG) zero-day, with a focus on entities across the Americas.

BleepingComputer
#BarracudaESG Alert! A zero-day vulnerability (CVE-2023-2868) was exploited and has been patched. If impacted, check your ESG interface for instructions and review your networks for compromises. Stay safe! More details: https://securityaffairs.com/146620/hacking/barracuda-email-security-gateway-bug.html #Cybersecurity #ZeroDay
Barracuda Email Security Gateway (ESG) hacked via zero-day bug

Barracuda warned customers that some of its Email Security Gateway (ESG) appliances were breached exploiting a zero-day vulnerability. Network security solutions provider Barracuda warned customers that some of its Email Security Gateway (ESG) appliances were recently breached by threat actors exploiting a now-patched zero-day vulnerability. The vulnerability, tracked as CVE-2023-2868, resides in the module for […]

Security Affairs