barracuda CVE Vulnerabilities & Metrics

Focus on barracuda vulnerabilities and metrics.

Last updated: 16 Apr 2025, 22:25 UTC

About barracuda Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with barracuda. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total barracuda CVEs: 11
Earliest CVE date: 25 May 2015, 22:59 UTC
Latest CVE date: 03 Mar 2023, 22:15 UTC

Latest CVE reference: CVE-2023-26213

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical barracuda CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.85

Max CVSS: 9.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 1
4.0-6.9 4
7.0-8.9 5
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS barracuda CVEs

These are the five CVEs with the highest CVSS scores for barracuda, sorted by severity first and recency.

All CVEs for barracuda

CVE-2023-26213 barracuda vulnerability CVSS: 0 03 Mar 2023, 22:15 UTC

On Barracuda CloudGen WAN Private Edge Gateway devices before 8 webui-sdwan-1089-8.3.1-174141891, an OS command injection vulnerability exists in /ajax/update_certificate - a crafted HTTP request allows an authenticated attacker to execute arbitrary commands. For example, a name field can contain :password and a password field can contain shell metacharacters.

CVE-2021-42711 barracuda vulnerability CVSS: 7.2 01 Dec 2021, 23:15 UTC

Barracuda Network Access Client before 5.2.2 creates a Temporary File in a Directory with Insecure Permissions. This file is executed with SYSTEM privileges when an unprivileged user performs a repair operation.

CVE-2019-5648 barracuda vulnerability CVSS: 5.5 12 Mar 2020, 13:15 UTC

Authenticated, administrative access to a Barracuda Load Balancer ADC running unpatched firmware <= v6.4 allows one to edit the LDAP service configuration of the balancer and change the LDAP server to an attacker-controlled system, without having to re-enter LDAP credentials. These steps can be used by any authenticated administrative user to expose the LDAP credentials configured in the LDAP connector over the network.

CVE-2014-2595 barracuda vulnerability CVSS: 7.5 12 Feb 2020, 01:15 UTC

Barracuda Web Application Firewall (WAF) 7.8.1.013 allows remote attackers to bypass authentication by leveraging a permanent authentication token obtained from a query string.

CVE-2019-6724 barracuda vulnerability CVSS: 7.2 21 Mar 2019, 16:01 UTC

The barracudavpn component of the Barracuda VPN Client prior to version 5.0.2.7 for Linux, macOS, and OpenBSD runs as a privileged process and can allow an unprivileged local attacker to load a malicious library, resulting in arbitrary code executing as root.

CVE-2018-20369 barracuda vulnerability CVSS: 4.3 23 Dec 2018, 02:29 UTC

Barracuda Message Archiver 2018 has XSS in the error_msg exception-handling value for the ldap_user parameter to the cgi-mod/ldap_load_entry.cgi module. The injection point of the issue is the Add_Update module.

CVE-2014-8428 barracuda vulnerability CVSS: 7.5 28 Aug 2017, 15:29 UTC

Privilege escalation vulnerability in Barracuda Load Balancer 5.0.0.015 via the use of an improperly protected SSH key.

CVE-2014-8426 barracuda vulnerability CVSS: 7.5 28 Aug 2017, 15:29 UTC

Hard coded weak credentials in Barracuda Load Balancer 5.0.0.015.

CVE-2017-6320 barracuda vulnerability CVSS: 9.0 18 Jul 2017, 14:29 UTC

A remote command injection vulnerability exists in the Barracuda Load Balancer product line (confirmed on v5.4.0.004 (2015-11-26) and v6.0.1.006 (2016-08-19); fixed in 6.1.0.003 (2017-01-17)) in which an authenticated user can execute arbitrary shell commands and gain root privileges. The vulnerability stems from unsanitized data being processed in a system call when the delete_assessment command is issued.

CVE-2015-0962 barracuda vulnerability CVSS: 4.3 25 May 2015, 22:59 UTC

Barracuda Web Filter 7.x and 8.x before 8.1.0.005, when SSL Inspection is enabled, uses the same root Certification Authority certificate across different customers' installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate's trust relationship.

CVE-2015-0961 barracuda vulnerability CVSS: 4.3 25 May 2015, 22:59 UTC

Barracuda Web Filter before 8.1.0.005, when SSL Inspection is enabled, does not verify X.509 certificates from upstream SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.