Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, does not correctly verify the name of an attacker-controlled WSDL service, leading to insecure reflection. This can result in remote code execution through either invocation of arbitrary methods or deserialization of untrusted types.
History

Wed, 10 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Barracuda Networks
Barracuda Networks rmm
Vendors & Products Barracuda Networks
Barracuda Networks rmm

Wed, 10 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 16:00:00 +0000

Type Values Removed Values Added
Description Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, does not correctly verify the name of an attacker-controlled WSDL service, leading to insecure reflection. This can result in remote code execution through either invocation of arbitrary methods or deserialization of untrusted types.
Title Barracuda RMM < 2025.1.1 Service Center Insecure Reflection RCE
Weaknesses CWE-470
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-12-10T15:45:09.223Z

Updated: 2025-12-10T16:33:04.220Z

Reserved: 2025-04-15T19:15:22.596Z

Link: CVE-2025-34393

cve-icon Vulnrichment

Updated: 2025-12-10T16:32:53.410Z

cve-icon NVD

Status : Received

Published: 2025-12-10T16:16:24.340

Modified: 2025-12-10T16:16:24.340

Link: CVE-2025-34393

cve-icon Redhat

No data.