Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 16 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Apr 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Barracuda Networks
Barracuda Networks rmm |
|
| Vendors & Products |
Barracuda Networks
Barracuda Networks rmm |
Wed, 15 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerability that allows local attackers to gain SYSTEM-level privileges by exploiting overly permissive filesystem ACLs on the C:\Windows\Automation directory. Attackers can modify existing automation content or place attacker-controlled files in this directory, which are then executed under the NT AUTHORITY\SYSTEM account during routine automation cycles, typically succeeding within the next execution cycle. | |
| Title | Barracuda RMM < 2025.2.2 Privilege Escalation via Insecure Directory Permissions | |
| Weaknesses | CWE-732 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-16T12:05:01.880Z
Reserved: 2026-01-08T19:04:26.365Z
Link: CVE-2026-22676
Updated: 2026-04-16T11:21:47.451Z
Status : Awaiting Analysis
Published: 2026-04-15T21:17:04.447
Modified: 2026-04-17T15:38:09.243
Link: CVE-2026-22676
No data.
OpenCVE Enrichment
Updated: 2026-04-16T02:30:21Z