Critical Bugs Could Let Attackers Remotely Hack, Damage APC Smart-UPS Devices

Three high-impact security vulnerabilities have been disclosed in APC Smart-UPS devices that could be abused by remote adversaries as a physical weapon to access and control them in an unauthorized manner.

Collectively dubbed TLStorm, the flaws “allow for complete remote takeover of Smart-UPS devices and the ability to carry out extreme cyber-physical attacks,” Ben Seri and Barak Hadad, researchers from IoT security company Armis, said in a report published Tuesday.

Uninterruptible power supply (UPS) devices function as emergency backup power providers in mission-critical environments such as medical facilities, server rooms, and industrial systems. Most of the afflicted devices, totaling over 20 million, have been identified so far in healthcare, retail, industrial, and government sectors.

TLStorm consists of a trio of critical flaws that can be triggered via unauthenticated network packets without requiring any user interaction, meaning it’s a zero-click attack, with two of the issues involving a case of faulty TLS handshake between the UPS and the APC cloud –

  • CVE-2022-22805 (CVSS score: 9.0) – TLS buffer overflow
  • CVE-2022-22806 (CVSS score: 9.0) – TLS authentication bypass
  • CVE-2022-0715 (CVSS score: 8.9) – Unsigned firmware upgrade that can be updated over the network

Successful exploitation of any of the flaws could result in remote code execution (RCE) attacks on vulnerable devices, which in turn could be weaponized to tamper with the operations of the UPS to physically damage the device Read more:

Leave a Reply

Your email address will not be published. Required fields are marked *