• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Multiple Vulnerabilities Discovered in Dataprobe’s iBoot-PDUs

You are here: Home / General Cyber Security News / Multiple Vulnerabilities Discovered in Dataprobe’s iBoot-PDUs
September 21, 2022

Claroty’s study arm, Staff82, has found out many new vulnerabilities in Dataprobe’s iBoot–PDU (electrical power distribution models).

The company printed the conclusions Tuesday in an advisory launched in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA).

The technological write–up describes the recently uncovered flaws, stating that if exploited, they pose a selection of hazards to Dataprobe, like giving management of the iBoot–PDU to attackers.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


According to the advisory, PDUs are really typical in industrial environments, with some of them having remote obtain and regulate abilities.

Regretably, Staff82 wrote, attacking a remotely exploitable vulnerability in a PDU component, like its web–based interface or cloud–based management platform, puts an attacker in the position of disrupting critical expert services by cutting off the electrical electric power to the machine and almost everything else that may perhaps be plugged into it. 

The firm spelled out that they started investigating Dataprobe’s iBoot–PDU soon after studying a 2021 Censys report revealing that extra than 2000 PDUs have been uncovered to the internet, with 31% of individuals currently being Dataprobe gadgets. 

“That report prompted us to analyze the security of Dataprobe iBoot–PDUs and identify regardless of whether we could remotely entry the system, bypassing authentication specifications, and getting code execution,” Staff82 wrote.

The analysis led to the discovery of 7 new vulnerabilities, a single of which enables an attacker to enumerate linked PDUs by way of a Censys lookup in order to realize the obtainable attack area. Many others permitted for authentication bypass and pre–authentication code execution on internet–connected equipment. 

“For cloud–managed PDUs, Workforce82 was able to access individuals units by exploiting obtain management flaws in buy to bypass network deal with translation and firewall protections,” the security gurus wrote. 

“Doing so enables an attacker to execute code on cloud–connected PDUs, or get hold of cloud qualifications to shift laterally on the network.”

All of these vulnerabilities were disclosed to Dataprobe earlier this yr and patched by the business.

“Users are urged to employ these fixes,” Group82 explained. “Dataprobe also recommends people disable SNMP, telnet, and HTTP, if not in use, as mitigation towards some of these vulnerabilities.”

Crew82 also just lately released a independent report suggesting the selection of vulnerability disclosures impacting prolonged internet of matters (XIoT) gadgets enhanced by 57% in the first fifty percent of 2022.


Some parts of this short article are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News NCSC: British Retailers Need to Move Beyond Passwords
Next Post: 350K Open-Source Projects At Risk of Supply Chain Vulnerability Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
  • How to Interpret the 2023 MITRE ATT&CK Evaluation Results
  • Iranian Nation-State Actor OilRig Targets Israeli Organizations
  • High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server
  • Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable
  • Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents
  • Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge
  • The Rise of the Malicious App
  • China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers
  • Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers

Copyright © TheCyberSecurity.News, All Rights Reserved.