Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 10 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Barracuda Networks
Barracuda Networks rmm |
|
| Vendors & Products |
Barracuda Networks
Barracuda Networks rmm |
Wed, 10 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, exposes a .NET Remoting service in which an unauthenticated attacker can invoke a method vulnerable to path traversal to read arbitrary files. This vulnerability can be escalated to remote code execution by retrieving the .NET machine keys. | |
| Title | Barracuda RMM < 2025.1.1 Service Center .NET Remoting Path Traversal RCE | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-10T16:13:16.457Z
Reserved: 2025-04-15T19:15:22.596Z
Link: CVE-2025-34395
Updated: 2025-12-10T16:12:59.390Z
Status : Awaiting Analysis
Published: 2025-12-10T16:16:24.640
Modified: 2025-12-12T15:18:42.140
Link: CVE-2025-34395
No data.
OpenCVE Enrichment
Updated: 2025-12-10T21:33:11Z