CVE-2025-34395
Barracuda RMM < 2025.1.1 Service Center .NET Remoting Path Traversal RCE
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, exposes a .NET Remoting service in which an unauthenticated attacker can invoke a method vulnerable to path traversal to read arbitrary files. This vulnerability can be escalated to remote code execution by retrieving the .NET machine keys.
| CWE | CWE-22 |
| Vendor | barracuda networks |
| Product | rmm |
| Published | Dec 10, 2025 |
| Last Updated | Mar 5, 2026 |
Stay Ahead of the Next One
Get instant alerts for barracuda networks rmm
Be the first to know when new unknown vulnerabilities affecting barracuda networks rmm are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Barracuda Networks / RMM
2025.1 < 2025.1.1
References
download.mw-rmm.barracudamsp.com: https://download.mw-rmm.barracudamsp.com/PDF/2025.1.1/RN_BRMM_2025.1.1_EN.pdf barracuda.com: https://www.barracuda.com/products/msp/network-protection/rmm vulncheck.com: https://www.vulncheck.com/advisories/barracuda-rmm-service-center-net-remoting-path-traversal-rce
Credits
Piotr Bazydlo of watchTowr