Overview
Barracuda Email Security Gateway (ESG) appliance contains an improper input validation vulnerability of a user-supplied .tar file, leading to remote command injection.
https://status.barracuda.com/incidents/34kx82j5n4q9; https://nvd.nist.gov/vuln/detail/CVE-2023-2868
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2023-2868 |
| Vendor / Product | Barracuda Networks — Email Security Gateway (ESG) Appliance |
| NVD Published | 2023-05-24 |
| NVD Last Modified | 2025-10-24 |
| CVSS 3.1 Score | 9.4 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L |
| Severity | CRITICAL |
| CWE | CWE-20 |
| CISA KEV Added | 2023-05-26 |
| CISA KEV Deadline | 2023-06-16 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low
Required Action
CISA BOD 22-01 Deadline: 2023-06-16.
Apply updates per vendor instructions.
Timeline
| Date | Event |
|---|---|
| 2023-05-26 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2023-06-16 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2023-2868 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |