CVE-2026-22676 PUBLISHED

Barracuda RMM < 2025.2.2 Privilege Escalation via Insecure Directory Permissions

Assigner: VulnCheck
Reserved: 08.01.2026 Published: 15.04.2026 Updated: 16.04.2026

Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerability that allows local attackers to gain SYSTEM-level privileges by exploiting overly permissive filesystem ACLs on the C:\Windows\Automation directory. Attackers can modify existing automation content or place attacker-controlled files in this directory, which are then executed under the NT AUTHORITY\SYSTEM account during routine automation cycles, typically succeeding within the next execution cycle.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.5

Product Status

Vendor Barracuda Networks
Product RMM
Versions Default: unaffected
  • affected from 0 to 2025.2.2 (excl.)

References

Problem Types

  • CWE-732 Incorrect Permission Assignment for Critical Resource CWE