The company apologizes to customers for design decisions regarding remote support feature and investigates new ways to strengthen it Barracuda Networks released a new update on Monday to further mitigate a security issue that could have allowed attackers to gain unauthorized access to some of its network security appliances through backdoor accounts originally intended for remote support. The company apologized to customers for its design decisions that led to this situation and promised to look into additional ways to strengthen the remote support functionality. Two weeks ago, security researchers from Austria-based security firm SEC Consult, revealed that Barracuda Networks appliances contain several undocumented — backdoor — accounts. Furthermore, the default firewall configuration of those devices made it possible for attackers to access the undocumented accounts from a predefined set of public IP (Internet Protocol) addresses, some of which did not belong to Barracuda Networks.The company responded at the time by releasing a “Security Definition” update that it claimed “drastically minimized attack vectors” by disabling remote access to non-essential accounts. However, on Monday the company released a new update — Security Definition 2.0.7 — to further mitigate the issue by removing the unauthorized IP address ranges from the default firewall rules.“The security and remote access functionality recently reported by a security researcher were implemented years ago, and were not diligently updated as our network evolved,” Barracuda Networks co-founder and Chief Technology Officer Zach Levow, said Monday in a blog post. “Over the years, we’ve made support our main focus, doing as much as possible to provide the best support to our customers,” Levow said. “However, I realize that in doing so, we missed the balance required in today’s security and network environment. We overlooked the importance of not putting support controls front and center in the user interface, and the issues related to making support access opt-out rather than opt-in if certain appliances are not behind a firewall. I regret now some of the choices we made and apologize to our customers and partners who feel misled or deceived by the way it was implemented. I assure you we are working day and night to make further changes that integrate the feedback and expectations you have shared with us.”Levow pointed out in the blog post that Barracuda Backup, Barracuda NG Firewall, Barracuda Firewall, Barracuda Load Balancer, Barracuda Link Balancer and Barracuda Web Application Firewall (versions 7.7 and later) are not affected by this issue, despite the initial reports. The affected appliances are Barracuda Spam & Virus Firewall, Barracuda Web Filter, Barracuda Message Archiver, Barracuda SSL VPN, Barracuda Web Application Firewall version 7.6.4 and earlier, and CudaTel, he said.While the new security updates considerably restrict the ability of attackers to gain unauthorized access to Barracuda devices through the remote support feature, they do not remove the feature completely. Barracuda support technicians can still remotely access appliances if they are directly connected to the Internet, an ability that some customers might not be comfortable with.“While we speak openly about our ability to remotely support customer boxes, the implications of this type of deployment are not explicitly documented,” Levow said. “We encourage customers to deploy their appliances behind a firewall that is configured to pass only traffic intended for the appliance.”Barracuda is currently analyzing ways to change the feature so that establishing a remote support tunnel would require customer interaction even if the appliance is connected directly to the Internet, Levow said. Related content news Apple patches info-stealing, zero day bugs in iPads and Macs The vulnerabilities that can allow the leaking of sensitive information and enable arbitrary code execution have had exploitations in the wild. By Shweta Sharma Dec 01, 2023 3 mins Zero-day vulnerability feature The CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. By CSO Staff Dec 01, 2023 6 mins Technology Industry IT Skills Events news Conti-linked ransomware takes in $107 million in ransoms: Report A ransomware campaign linked to the ostensibly defunct Conti malware group has targeted mostly US businesses, in a costly series of attacks. By Jon Gold Nov 30, 2023 4 mins Ransomware news Okta confirms recent hack affected all customers within the affected system Contrary to its earlier analysis, Okta has confirmed that all of its customer support system users are affected by the recent security incident. By Shweta Sharma Nov 30, 2023 3 mins Data Breach Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe