Dec 29, 2023
Oct 31, 2025
Kat Desy
Written by: Ferhat Dikbiyik
Additional Contributions: Ferdi Gül and Yavuz Han
Edited by: Katherine Desy
Welcome to this week’s Focus Friday, where we spotlight a critical vulnerability in Barracuda’s Email Security Gateway (ESG) Appliance, identified as CVE-2023-7102. This vulnerability, involving Arbitrary Code Execution and Parameter Injection, has raised significant security concerns, particularly following reports of its exploitation by threat actors. With the widespread use of Barracuda ESG in various organizations, understanding and addressing this vulnerability is crucial. In this blog, we’ll explore the nature of CVE-2023-7102, its potential impacts, and how Black Kite’s Focus Tags™ assist TPRM professionals in managing this emerging threat.

CVE-2023-7102, a critical vulnerability in Barracuda’s Email Security Gateway (ESG) Appliance, poses a significant security threat. This vulnerability allows arbitrary code execution and parameter injection due to a flaw in the Spreadsheet::ParseExcel library used for parsing Excel files. The library’s lack of validation for user-supplied input in Excel number formats enables attackers to manipulate the number format property in an Excel file, leading to potential code execution. Barracuda identified that this vulnerability was exploited by the China-based actor UNC4841, using it to deploy SEASPY and SALTWATER malware on affected ESG devices. The vulnerability impacts all Barracuda ESG Appliance devices with versions from 5.1.3.001 to 9.2.1.001, making it a concern for a broad range of users and applications. Barracuda’s response included a patch released on December 22, 2023, to address compromised ESG appliances and the associated malware indicators.

The CVE-2023-7102 vulnerability in Barracuda ESG is particularly concerning for Third-Party Risk Management (TPRM) professionals due to its potential for arbitrary code execution and parameter injection in a widely-used email security appliance. The exploitation of this vulnerability can lead to unauthorized access, data breaches, and malware deployment within an organization’s network. Given the widespread application of Barracuda ESG across various industries, TPRM professionals need to ensure their vendors using this appliance have implemented the necessary security measures and patches to mitigate the risk.
To address the CVE-2023-7102 vulnerability in Barracuda ESG, TPRM professionals should ask vendors specific, technical questions:
Vendors impacted by the CVE-2023-7102 vulnerability in Barracuda ESG should take immediate remediation steps:
Leveraging Black Kite in response to the CVE-2023-7102 vulnerability in Barracuda ESG offers a strategic advantage for TPRM professionals. Black Kite’s focused tagging and risk assessment tools enable quick identification of vendors using affected versions of Barracuda ESG. This facilitates targeted communication and ensures that vendors are aware of the vulnerability and the necessary remediation steps.
Additionally, Black Kite provides detailed insights into the specific IT assets at risk, allowing for more precise and effective risk management strategies. This approach not only streamlines the risk mitigation process but also enhances overall cybersecurity preparedness against such critical vulnerabilities.

Black Kite’s Focus Tags™ are pivotal in advancing Third-Party Risk Management (TPRM), especially given the recent critical vulnerabilities like CVE-2023-7102 in Barracuda ESG. These tags:
Through Black Kite’s Focus Tags™, TPRM professionals gain valuable, actionable intelligence, enhancing their ability to manage emerging cyber threats effectively.
https://www.barracuda.com/company/legal/esg-vulnerability
https://thehackernews.com/2023/12/chinese-hackers-exploited-new-zero-day.html