Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, exposes a .NET Remoting service in which an unauthenticated attacker can invoke a method vulnerable to path traversal to read arbitrary files. This vulnerability can be escalated to remote code execution by retrieving the .NET machine keys.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 10 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Barracuda Networks
Barracuda Networks rmm
Vendors & Products Barracuda Networks
Barracuda Networks rmm

Wed, 10 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 16:00:00 +0000

Type Values Removed Values Added
Description Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, exposes a .NET Remoting service in which an unauthenticated attacker can invoke a method vulnerable to path traversal to read arbitrary files. This vulnerability can be escalated to remote code execution by retrieving the .NET machine keys.
Title Barracuda RMM < 2025.1.1 Service Center .NET Remoting Path Traversal RCE
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-10T16:13:16.457Z

Reserved: 2025-04-15T19:15:22.596Z

Link: CVE-2025-34395

cve-icon Vulnrichment

Updated: 2025-12-10T16:12:59.390Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-10T16:16:24.640

Modified: 2025-12-12T15:18:42.140

Link: CVE-2025-34395

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-10T21:33:11Z

Weaknesses