CVE-2023-2868

ENISA EUVD: EUVD-2023-34316 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 14 articles Published: 2023-05-24

EPSS Score

Source: FIRST.org · 2026-05-23
89.98%
probability
This CVE has a 89.98% probability of being exploited in the next 30 days.
0% Top 99.6th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
9.4
CRITICAL
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

Description

VulnerabilityLookup (CNA)
A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.

Affected Products

Barracuda
Barracuda Email Security Gateway
5.1.3.001

Attack Intelligence

Google Project Zero

Discovered
May 18, 2023
Patched
May 30, 2023
Reported by
???
Root Cause Analysis
???

Exploits & PoC

Signal Intelligence

Confidence
92%
EPSS 89.98%
CVSS v3.1 9.4
Mentions 14
Last Seen Dec 27, 2023

CNA Information

CNA Assigner
Google
CNA Title
Remote Code injection in Barracuda Email Security Gateway

Analyst Note

This CVE is confirmed as a zero-day exploited in active attacks by Chinese threat actors against Barracuda Email Security Gateway appliances. The critical CVSS 9.4 score, inclusion in Google Project Zero, and reporting by reputable security outlets (BleepingComputer) corroborate the vulnerability's existence and severity.

Threat Actors 13

Lazarus Group
apt_group Information theft and espionage 🇰🇵 KP
APT 28
apt_group Information theft and espionage 🇷🇺 RU
Cron
apt_group 🇷🇺 RU
Vicious Panda
apt_group Information theft and espionage 🇨🇳 CN
Hacking Team
apt_group 🇮🇹 IT
GhostEmperor
apt_group Information theft and espionage 🇨🇳 CN
Infy
apt_group Information theft and espionage 🇮🇷 IR
FamousSparrow
apt_group Information theft and espionage 🇨🇳 CN
Earth Estries
apt_group Information theft and espionage 🇨🇳 CN
HAFNIUM
apt_group Information theft and espionage 🇨🇳 CN
APT 22
apt_group Information theft and espionage 🇨🇳 CN
UNC4841
apt_group Information theft and espionage 🇨🇳 CN
Red October
apt_group 🇷🇺 RU

Triage Info

Decided atMar 03, 2026
Published DateMay 24, 2023