what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Barracuda Load Balancer ADC Key Recovery / Password Reset

Barracuda Load Balancer ADC Key Recovery / Password Reset
Posted Jan 20, 2015
Authored by Cristiano Maruti

Barracuda Load Balancer ADC with firmware version 5.0.0.015 suffers from multiple security issues. There is an ability to recover the file system encryption keys via simil cold-boot attack, an off-line super user password reset via physical attack, hard-coded credential and hard-coded ssh key issues, and various other problems.

tags | advisory
advisories | CVE-2014-8426, CVE-2014-8428
SHA-256 | 5c42032507e2bcde6818fa49b6b98725db14f0fa3e856bb46af8de90d060d086

Barracuda Load Balancer ADC Key Recovery / Password Reset

Change Mirror Download
===============================================================================
title: Virtual Appliance Security Review
case id: CM-2013-01
product: Barracuda Load Balancer ADC
vulnerability type: Multiple
severity: Medium to High
found: 2013-12-13
by: Cristiano Maruti (@cmaruti)
===============================================================================

[EXECUTIVE SUMMARY]

While reviewing the virtual appliance, five major security issues were
identified:
1) Ability to recover the file system encryption keys via simil cold-boot
attack;
2) Off-line super user password reset via physical attack;
3) Hard-coded credential for an interactive unprivileged user;
4) Hard-coded SSH key file that could permit local privilege escalation;
5) Various credentials and private IP address of Barracuda’s internal server.

[VULNERABLE VERSIONS]

Barracuda Load Balancer - firmware version 5.0.0.015. Probably there are other
appliances from the vendor affected by the same problems.

[TECHNICAL DETAILS]

The full report with technical details about the vulnerabilities I have
identified is available at:
https://github.com/cmaruti/reports/raw/master/barracuda_load_balancer_vm.pdf

[VULNERABILITY REFERENCE]

The following ID were associated by Barracuda (BNSECID) to handle the
vulnerabilities:
- BNSEC-0004000355: VM filesystem encryption keys can be leaked through memory
dump.
- BNSEC-0006000122: VM appliance susceptible to off-line user password reset.
- BNSEC-0006000124: VM filesystem encryption keys can be leaked through memory
dump.
- BNSEC-0006000123: Hard coded weak credentials for product user.
- BNSEC-0006000126: Internal system information leakage through VM virtual
drive.
- BNSEC-0006000125: Privilege escalation using improperly protected SSH key.

The following CVE IDs were pre-allocated to track the vulnerabilities:
- CVE-2014-8426: Hard coded weak credentials for product user.
- CVE-2014-8428: Privilege escalation using improperly protected SSH key.

[DISCLOSURE TIMELINE]

2014-01-03 Report submitted to vendor via its bug bounty program.
2014-01-03 Vendor confirmed receiving the report (automatic reply).
2014-01-09 Vendor gave follow-up.
2014-01-13 Vendor provided BNSEC IDs.
2014-01-22 Researcher requested further update about the status of the
submission.
2014-01-22 Vendor gave follow-up and updates the list of BNSEC IDs.
2014-02-06 Researcher requested for the second time an update about the status
of his submission.
2014-02-06 Vendor acknowledged the delay in processing the submission because
of internal reorganization of the bounty program.
2014-03-18 Vendor sent update. Confirming the severity of the vulnerabilities,
still processing the submission and developing appropriate fixes.
2014-03-20 Vendor approved bounty. Four of five vulnerabilities are eligible
for the bounty program.
2014-04-20 Barracuda created fixes for the issues reported but postponed the
test due to addressing the Heartbleed vulnerability.
2014-04-23 Researcher received the bounty prize.
2014-05-06 Vendor gave follow-up but no further details about the status of the
patching process were disclosed.
2014-06-04 Researcher requested further update about the status of the
submission.
2014-10-01 Vendor postponed the fix due to Shellshock vulnerability.
2014-12-05 Vendor escalated the issues due to cleanup delayed too many times;
coordinated disclosure date will be on January 20th, 2015.
2015-01-20 Public disclosure.

[SOLUTION]

Vendor addressed the vulnerabilities identified by CVE-2014-8426 and
CVE-2014-8428. The Vendor is currently evaluating ways to mitigate the
remaining ones.

[REPORT URL]

https://github.com/cmaruti/reports/raw/master/barracuda_load_balancer_vm.pdf


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close