Barracuda Urges Immediate Replacement of Hacked ESG Appliances

Enterprise security company Barracuda is now urging customers who were impacted by a recently disclosed zero-day flaw in its Email Security Gateway (ESG) appliances to immediately replace them.

“Impacted ESG appliances must be immediately replaced regardless of patch version level,” the company said in an update, adding its “remediation recommendation at this time is full replacement of the impacted ESG.”

While the company did not disclose the reasons behind the move, it’s likely an indication that the threat actors behind the campaign managed to tamper with the firmware on a much deeper level that a patch cannot completely address.

The latest development comes as Barracuda disclosed that a critical flaw in the devices (CVE-2023-2868, CVSS score: 9.8) had been exploited as a zero-day for at least seven months since October 2022 to deliver bespoke malware and steal data.

The vulnerability concerns a case of remote code injection affecting versions through that stems from an incomplete validation of attachments contained within incoming emails. It was addressed on May 20 and May 21, 2023.

The three different malware families discovered to date come with capabilities to upload or download arbitrary files, execute commands, set up persistence, and establish reverse shells to an actor-controlled server.

The exact scope of the incident still remains unknown. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recommended that federal agencies apply the fixes by June 16, 2023.

Related Articles

Back to top button