Trending

Uninterrupted-Power-Supply-UPS

Uninterrupted Power Supply (UPS): A Silent Threat to Critical Infrastructure Resilience

Critical PowerPanel Business Vulnerabilities put Critical Infrastructure sectors at risk.

Multiple Vulnerabilities Disclosed in CyberPower UPS Management Software 

Executive Summary 

UPS management software is employed by a broad spectrum of users, encompassing data centers, critical manufacturing sectors, healthcare facilities, educational institutions, government agencies, and beyond, to maintain uninterrupted mission-critical operations. 

The recent disclosure of multiple vulnerabilities within CyberPower PowerPanel Business Software has raised significant concerns regarding the security of critical infrastructure (CI) sectors. These vulnerabilities pose a serious risk to the integrity and reliability of CI systems, potentially exposing them to exploitation by malicious actors. 

The Cybersecurity and Infrastructure Security Agency (CISA), a key entity within the United States government responsible for safeguarding critical infrastructure, has issued security alerts highlighting the heightened interest of hacktivist groups in targeting internet-exposed Industrial Control Systems (ICS) devices. This revelation further amplifies the urgency surrounding the recent PowerPlay vulnerabilities. 

PowerPanel Business Software Overview 

UPS management software such as PowerPanel is designed to provide advanced power management for Uninterrupted Power Supply, Power Distribution Unit, or Automatic Transfer Switch.  

PowerPanel UPS management software features real-time monitoring, remote management, event logging, automatic shutdown, scheduled maintenance, alarm notifications, energy management, multi-device support, user access control, and integration capabilities. These features enable organizations to efficiently monitor, control, and manage their UPS systems, ensuring continuous power availability, minimizing downtime, and optimizing energy usage. 

Vulnerability Details 

The table below provides details on the vulnerabilities impacting PowerPanel, a business management software: 4.9.0 and prior. The official vendor, CyberPower has released a patch that fixes these vulnerabilities. – Link

report-ad-banner
CVE CWE Severity 
CVE-2024-34025 USE OF HARD-CODED PASSWORD  Critical 
CVE-2024-32053 USE OF HARD-CODED CREDENTIALS Critical 
CVE-2024-32047 ACTIVE DEBUG CODE Critical 
CVE-2024-33615 RELATIVE PATH TRAVERSAL High 
CVE-2024-31856 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND (‘SQL INJECTION’)  High 
CVE-2024-31410 USE OF HARD-CODED CRYPTOGRAPHIC KEY Medium 
CVE-2024-31409 IMPROPER AUTHORIZATION Medium 
CVE-2024-32042 STORING PASSWORDS IN A RECOVERABLE FORMAT  Low 

The exploitation of the vulnerabilities in vulnerable PowerPanel could allow an attacker to potentially bypass authentication and obtain administrator privileges, which could be utilized for writing arbitrary files to the server for code execution, gaining access to sensitive information, impersonating any client to sending malicious data and gaining access to the testing or production server. 

If an attacker is able to manipulate UPS management software, the target organization might face severe consequences, including: 

  • Disruption of Operations 
  • Loss of Data 
  • Compromised Security 
  • Financial Losses 

Understanding the impact of a successful cyberattack via vulnerable UPS Management software, CRIL researchers’ investigation led to the discovery of over 600 internet-exposed PowerPanel Business software.  

Given below are screenshots of the internet exposed PowerPanel Business applications. 

Voltage Vendetta: Lessons from the Past

CRIL researchers have been closely monitoring hacktivist claims of targeting internet-exposed Industrial Control System (ICS) devices. In past campaigns launched by hacktivist groups such as GhostSec, SigedSec, TeamOneFist, etc. – cyberattacks on UPS systems have emerged as a key vector in such campaigns to cause mass disruptions and gather notoriety from such attacks. Even though the impact of such claims remains questionable, the exposure and direct access of UPS systems to an attacker is a deeply concerning scenario. 

The OpColombia campaign launched by SiegdSec in collaboration with GhostSec and multiple campaigns launched by TeamOneFist in response to the Russia-Ukraine war in 2023 is a few notable incidents in which UPS systems manufactured by Schneider Electric, Powest, and APC were allegedly targeted.  

Figure 1– Powest UPS systems targeted during  #OpColombia 

Figure 2 – Schneider and APC UPS targeted by Team OneFist 

Conclusion 

CRIL researchers speculate that threat actors could soon leverage the critical vulnerabilities disclosed in PowerPanel in upcoming campaigns. With the potential for exploitation looming, urgent attention to patching and mitigation measures is imperative to preemptively thwart any attempts to exploit these weaknesses. Proactive steps such as monitoring for suspicious activities, implementing network segmentation, and enhancing user awareness can bolster defenses against potential attacks. 

Recommendations

  • Implement a robust patch management strategy to promptly address vulnerabilities in software and systems. Ensure that security patches are regularly applied to all devices and applications, prioritizing critical updates to mitigate potential risks effectively. 
  • Conduct periodic security audits and penetration testing exercises to assess the effectiveness of existing security controls and identify vulnerabilities. Regularly review configurations, policies, and procedures to ensure compliance with security best practices and regulatory requirements. 
  • Utilize asset management tools and network discovery techniques to maintain an accurate inventory of all devices and applications within the environment. Enhance visibility into asset configurations, vulnerabilities, and dependencies to facilitate effective risk management and incident response. 
  • Implementing Multi-Factor Authentication (MFA) for all remote access to the Operational Technology (OT) network, including connections from the IT network and external networks, is crucial for enhancing security. 

References 

https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01
https://www.cyberpower.com/in/en/product/series/powerpanel_business

 

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading