Security researchers at Armis have released a report pertaining to a trio of vulnerabilities that lie in Smart UPS devices sold by Schneider Electric The vulnerability allows for remote code execution, replacing of firmware, and potentially destroying the entire unit’s capabilities. According to Armis, the flaws stem from both bad TLS implementation and the connected cloud-based system controlling newer devices. As Armis explained, because the devices have a TLS connection has an error, the APC leaves the connection open rather than closing the connection as recommended by the library writers. Therefore, the library is put into a state it is not built to handle, and the device may burn out. Ignoring the library errors can have serious implications, Armis explains, as an attacker can use the TLS resumption functionality, and the uninitialized keys are manipulated to communicate with the device as if the attacker is a genuine Schneider Electric server. Masquerading as a verified server, the attacker can issue a firmware upgrade command and remotely execute code over the UPS device. Additionally, all of the Smart UPS devices use the same symmetric key for encryption and decryption.
Link:
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |