Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 16 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Apr 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Barracuda Networks
Barracuda Networks rmm |
|
| Vendors & Products |
Barracuda Networks
Barracuda Networks rmm |
Wed, 15 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerability that allows local attackers to gain SYSTEM-level privileges by exploiting overly permissive filesystem ACLs on the C:\Windows\Automation directory. Attackers can modify existing automation content or place attacker-controlled files in this directory, which are then executed under the NT AUTHORITY\SYSTEM account during routine automation cycles, typically succeeding within the next execution cycle. | |
| Title | Barracuda RMM < 2025.2.2 Privilege Escalation via Insecure Directory Permissions | |
| Weaknesses | CWE-732 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-16T12:05:01.880Z
Reserved: 2026-01-08T19:04:26.365Z
Link: CVE-2026-22676
Updated: 2026-04-16T11:21:47.451Z
Status : Awaiting Analysis
Published: 2026-04-15T21:17:04.447
Modified: 2026-04-17T15:38:09.243
Link: CVE-2026-22676
No data.
OpenCVE Enrichment
Updated: 2026-04-16T02:30:21Z