It seems like your browser didn't download the required fonts. Please revise your security settings and try again.

Several OpenSSL Vulnerabilities- (CVE-2023-0286, CVE-2022-4304, CVE-2022-4203, CVE-2023-0215, CVE-2022-4450, CVE-2023-0216, CVE-2023-0217 and CVE-2023-0401)

Details:

  • CVE-2023-0286: A type confusion vulnerability was found in OpenSSL when OpenSSL X.400 addresses processing inside an X.509 GeneralName. When CRL checking is enabled (for example, the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or cause a denial of service.
  • CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack.
  • CVE-2022-4203: A flaw was found in Open SSL. A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking.
  • CVE-2023-0215: A use-after-free vulnerability was found in OpenSSL's BIO_new_NDEF function.
  • CVE-2022-4450: A double-free vulnerability was found in OpenSSL's PEM_read_bio_ex function.
  • CVE-2023-0216: A flaw was found in OpenSSL. An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. This may result in an application crash which could lead to a denial of service.
  • CVE-2023-0217: A flaw was found in OpenSSL. An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the EVP_PKEY_public_check() function, most likely leading to an application crash.
  • CVE-2023-0401: A NULL pointer vulnerability was found in OpenSSL, which can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data.

Severities: High

Barracuda Networks: Barracuda CloudGen Firewall firmware versions 8.0.x, 8.2.x and 8.3.x as well as Barracuda CloudGen WAN firmware versions 8.3.0 and higher are vulnerable to the mentioned OpenSSL vulnerabilites.

The respective hotfixes for immediate mitigation are available here:

CGF 8.0.6 - fixing CVE-2023-0286, CVE-2022-4304 and CVE-2023-0215
CGF 8.2.2 - fixing CVE-2023-0286, CVE-2022-4304, CVE-2023-0215 and CVE-2022-4450
CGF 8.3.1 - fixing CVE-2023-0286, CVE-2022-4304, CVE-2022-4203, CVE-2023-0215, CVE-2022-4450, CVE-2023-0216, CVE-2023-0217 and CVE-2023-0401

Important Notice:

If you install hotfix 1090 on 8.0.6 and update to 8.2.2 you will have to install hotfix 1091 afterwards to re-apply the fixes.
If you install hotfix 1091 on 8.2.2 and update to 8.3.1 you will have to install hotfix 1092 afterwards to re-apply the fixes.