Authenticated, administrative access to a Barracuda Load Balancer ADC running unpatched firmware <= v6.4 allows one to edit the LDAP service configuration of the balancer and change the LDAP server to an attacker-controlled system, without having to re-enter LDAP credentials. These steps can be used by any authenticated administrative user to expose the LDAP credentials configured in the LDAP connector over the network.
References
Link | Resource |
---|---|
https://blog.rapid7.com/2020/03/05/r7-2019-39-cve-2019-5648-ldap-credential-exposure-in-barracuda-load-balancer-adc-fixed/ | Exploit Third Party Advisory |
https://blog.rapid7.com/2020/03/05/r7-2019-39-cve-2019-5648-ldap-credential-exposure-in-barracuda-load-balancer-adc-fixed/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.rapid7.com/2020/03/05/r7-2019-39-cve-2019-5648-ldap-credential-exposure-in-barracuda-load-balancer-adc-fixed/ - Exploit, Third Party Advisory |
Information
Published : 2020-03-12 13:15
Updated : 2024-11-21 04:45
NVD link : CVE-2019-5648
Mitre link : CVE-2019-5648
CVE.ORG link : CVE-2019-5648
JSON object : View
Products Affected
barracuda
- load_balancer_adc_firmware
- load_balancer_adc
CWE
CWE-522
Insufficiently Protected Credentials