Vulnerabilities in remote iBoot power distributors

Vulnerabilities in remote iBoot power distributors

Share post

This could cause power failures remotely: Team82 discovers vulnerabilities in iBoot power distribution units. Almost a third of all Power Distribution Units (PDU) that can be controlled via the Internet are devices from iBoot manufacturer Dataprobe. They are also found in powered switches.

Security researchers at Team82, the research arm of cyber-physical systems (CPS) security specialist Claroty, have disclosed multiple vulnerabilities in iBoot-PDU, Dataprobe's intelligent power distribution unit (PDU). The PDUs can be managed from any location via a web-based interface or a cloud-based platform.

Matching code ensures shutdown

By exploiting the vulnerabilities, attackers are able to remotely execute code and power off all connected devices. Dataprobe has fixed these vulnerabilities in a new version update. Users are strongly advised to update to version 1.42.06162022. To close some of the security gaps, Dataprobe also recommends disabling SNMP, Telnet, and HTTP when not in use.

Power Distribution Units, PDUs

Power distribution units (PDUs) are common devices in industrial environments, data centers, and other areas where power supplies need to be close to rack-mounted equipment. More and more PDUs can be controlled and managed remotely. An attack on a remotely exploitable vulnerability in a PDU component, e.g. B. in the web-based interface or the cloud-based management platform, an attacker can disrupt important services by removing the power supply to the device and subsequently to all devices connected to it. A 2021 report by Censys shows that more than 2.000 PDUs are connected to the internet. Almost a third (31%) of these are Dataprobe devices.

Seven vulnerabilities in iBoot PDUs

Team82 was able to uncover seven vulnerabilities in iBoot-PDU. The research builds on previous work by Team82 on the security of cloud-based management platforms. In July 2021, researchers released a report titled "Top-Down and Bottom-Up: Exploiting Vulnerabilities in the OT Cloud Era," which describes attacks targeting devices via the cloud and vice versa from devices to the cloud systems. The vulnerabilities found in Dataprobe made it possible to expose all iBoot PDU devices controlled via the web interface or from the cloud and remotely attack them, bypass NAT, routers and firewalls, execute code and cut the power. Cyber ​​criminals would also have an entry point into their victims' internal networks.

Important services can be switched off in this way

The disclosure of the vulnerabilities shows the fundamental need to assess the risk from all devices connected to the Internet or the cloud. Even a benign power distribution unit managed remotely over the internet or a cloud-based management platform can offer cybercriminals the opportunity to attack the network or disrupt vital services by cutting power to devices connected to a PDU. This poses an enormous risk, especially for data centers, since PDUs are often used in these to power the servers and other network devices. How an attack on the PDUs looks in detail and further information can be found in the corresponding blog post.

More at Claroty.com

 


About Claroty

Claroty, the Industrial Cybersecurity Company, helps its global customers discover, protect and manage their OT, IoT and IIoT assets. The company's comprehensive platform can be seamlessly integrated into customers' existing infrastructure and processes and offers a wide range of industrial cybersecurity controls for transparency, threat detection, risk and vulnerability management and secure remote access - with significantly reduced total cost of ownership.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more