The Barracuda Email Security Gateway (ESG) appliance was found to have a vulnerability potentially exploitable by Chinese threat actor, UNC4841. The flaw, tied to a third-party library, ‘Spreadsheet::ParseExcel’, can lead to arbitrary code execution. This was used to deploy SEASPY and SALTWATER malware. Barracuda has patched the vulnerability and automatically applied the update to all ESG devices. The vulnerability has been classified as CVE-2023-7102, but its severity is yet to be categorized.

Two Windows vulnerabilities, one a 0-day, are under active exploitation
Two Windows vulnerabilities—one a zero-day that has been known to attackers since 2017 and the other a critical flaw that Microsoft initially tried and failed
 
															
