Today i learned of an advisory posted on reddit regarding Barracuda and certain "support" ssh backdoors installed on many of their products. Unfortunately i dont have a Barracuda product to test the specific attack strings on, but i have been able to gather quite a bit of information on it:
Here is the reddit netsec article on it:
Here is the Neohapsis copypasta from SEC-consult:
Here is the original advisory:
Barracuda released several "tech alerts" about this vuln:
Here is a full disclosure post in 2011 where someone suspected Barracuda had a backdoor (for lolz)
Here is a blog post from 2009 (seriously) of a guy that got root access from the console and revealed overlapping details about the advisory:
Summary of the situation:
The following products:
Barracuda Spam and Virus Firewall
Barracuda Web Filter
Barracuda Message Archiver
Barracuda Web Application Firewall
Barracuda Link Balancer
Barracuda Load Balancer
Barracuda SSL VPN
(all including their respective virtual "Vx" versions)
vulnerable version: all versions less than Security Definition 2.0.5
All have preinstalled (undocumented) support accounts with SSH access in /etc/passwd.
The "product" support account drops you to shell without requiring SSH keys. Which also has access to the MySQL database that can modify the list of users who can log in...
Only hosts coming from certain IPs can access this ssh daemon:
There are certain reports that the "product" user requires no password.
If anyone can get me the user hashes, i can run it through my (pretty big/extensive) wordlists with rulesets.