Critical Security Update Needed for baramundi Management Suite
baramundi software GmbH has issued a critical security advisory regarding vulnerabilities discovered in their widely-used IT management solution, baramundi Management Suite (bMS). These vulnerabilities, classified as high to critical risk, could potentially allow attackers to escalate privileges and execute arbitrary code on affected servers.
High-Risk Vulnerability in baramundi Management Agent
The first vulnerability (CVE-2024-6689) resides within the baramundi Management Agent (bMA) and could enable a local attacker to elevate their privileges, granting them unauthorized access and control over the system. While not classified as critical, baramundi still strongly recommends immediate action to mitigate this risk.
Critical Vulnerability in baramundi Management Server
The second, and more severe vulnerability, affects the baramundi Management Server (bServer). This critical flaw could allow an attacker to store arbitrary files and execute malicious code on the server, potentially compromising the entire IT infrastructure under its management.
Immediate Action Required
To address these vulnerabilities, baramundi has released an update along with a FixIt tool (S-2024-01.zip) designed to simplify the patching process. This tool automatically deploys the correct versions of bMA setup files and bServer files to the baramundi Server, ensuring a smooth and efficient update.
The update covers the following bMS versions:
- baramundi Management Suite 2022
- baramundi Management Suite 2022 R2
- baramundi Management Suite 2023
- baramundi Management Suite 2023 R2
Organizations using any of these versions are strongly urged to apply the update as soon as possible to protect their systems from potential exploitation.