Barracuda’s maintenance backdoors open to more than support

  • Liam Tung (CSO Online)
  • — 25 January, 2013 10:50

All but three security and network appliances from Barracuda Networks contain undocumented backdoor accounts that allow remote access over SSL and VPN.

on Thursday warned of the backdoor accounts affecting the company’s appliances: Spam and Virus Firewall, Web Filter, Message Archiver, Web Application Firewall, Link Balancer, Load Balancer and SSL VPN.

The backdoor accounts were placed there by Barracuda as part of its remote support function, however security researcher Stefan Viehböck of SEC Consult Vulnerability Lab has found they were poorly implemented.

The undocumented accounts in the appliances are for the usernames “product”, “support” and “websupport”, according to H-Security. Others included “root”, “shutdown”, “qa_test”.

The accounts were protected by passwords that Viehböck was able to quickly crack with a “tiny” wordlist, which might be fine if SSL access was limited to Barracuda’s own support staff.

Barracuda whitelisted all but two IP address ranges that it used for the task, however the researcher found the ranges also contained servers from unaffiliated third parties -- “all of whom can access SSH on all affected Barracuda Networks appliances exposed to the Internet,” he noted.

In an alert on Thursday, Barracuda gave the threat a “medium” rating but advised clients nonetheless to apply the patch “immediately”.

The patch changes the sshd configurations to only allow the users “cluster” and “remote” access under a login and public/private key arrangement; while the username “root” is secured with a login and password/password hash.

“This still leaves considerable risks to appliances as the password for the 'root' user might be crackable and the relevant private keys for the 'remote' user might be stolen from Barracuda Networks,” says Viehböck.

“In secure environments it is highly undesirable to use appliances with backdoors built into them. Even if only the manufacturer can access them.”

Barracuda played down the threat, pointing out that only an attacker with specific internal knowledge of Barracuda appliances could pull off the attack from a small set of IP addresses.

Nonetheless, Viehböck recommends putting the appliances behind a firewall and blocking any incoming local and internet traffic to port 22 -- the port that the appliances accept traffic on by default.

Follow @CSO_Australia and sign up to the CSO Australia newsletter.

Tags: Barracuda Networks

Near field communication – the security risks

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

AVG Internet Security 2011 Business Edition

Ultimate protection for your small or medium-sized business

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.