Researchers from Trellix’s Advanced Research Center recently disclosed multiple critical, high, and medium severity vulnerabilities in CyberPower’s PowerPanel Enterprise Data Center Infrastructure Management (DCIM) platform and Dataprobe’s iBoot Power Distribution Unit (PDU). These vulnerabilities, if exploited, could allow attackers to gain complete control over these systems and use them as an entry point into broader data centers and enterprise networks. It is highly recommended that impacted customers patch these vulnerabilities as soon as possible. Let’s see what the researchers revealed about the multiple vulnerabilities in CyberPower and DataProbe Products and how to patch the flaws in this blog post.
CyberPower’s PowerPanel Enterprise is a leading DCIM platform that allows IT teams to manage, configure and monitor data center infrastructure through the cloud. It serves as a centralized source of information and control for all devices across on-premise and co-located data centers.
Some key features of PowerPanel Enterprise include:
Centralized monitoring and control of power devices like PDUs, UPSs, racks, etc.
Tracking energy usage and efficiency
Environmental monitoring of temperature, humidity, leaks, smoke, etc.
Visual mapping of data center assets and infrastructure
Reporting on capacity, uptime, alarms, etc.
Role-based access control and security
Integration with various third-party hardware and software systems
REST APIs for automation and integration
With data centers increasing rack densities to meet demands, DCIM platforms like PowerPanel Enterprise are becoming indispensable for enterprises to effectively manage these complex environments, prevent outages and maintain maximum uptime.
The iBoot PDU from Dataprobe is an intelligent power distribution unit designed to remotely monitor and control power supply to devices in data centers, labs, remote sites, etc.
Some key capabilities offered by iBoot PDU include:
Remotely switch power outlets on/off via the web interface
Reboot unresponsive equipment with the click of a button
Schedule power cycling based on the time of day
Monitor current, voltage, power consumption, etc.
Alerts for power failures, high load, etc.
Integration with DCIM and Building Management Systems
Centralized management via Dataprobe’s cloud portal
Control via REST APIs for automation
With remote outlet switching and power cycling, the iBoot PDU helps resolve common remote management issues like rebooting frozen devices, provisioning equipment, etc, without dispatching IT staff physically. Thousands of iBoot PDUs are deployed across data centers, telecom infrastructure, and other mission-critical environments.
The multiple vulnerabilities discovered in CyberPower and Dataprobe products can be chained together to gain complete control of these systems. The vulnerabilities would also allow attackers to remotely execute code on the appliances to create backdoors into the broader data center infrastructure.
Here you see the list of vulnerabilities in CyberPower’s PowerPanel Enterprise platform:
CVE ID | CVSS Score | Description |
---|---|---|
CVE-2023-3264 | 6.7 | Use of Hard-coded Credentials – Hardcoded credentials can allow attackers to easily gain unauthorized access. |
CVE-2023-3265 | 7.2 | Improper Neutralization of Escape Sequences – Allows bypassing authentication via injecting escape characters. |
CVE-2023-3266 | 7.5 | Improper Security Check Implementation – Flawed validation logic results in authentication bypass. |
CVE-2023-3267 | 7.5 | OS Command Injection – Flaws enable executing arbitrary system commands as root user. |
Here you see the list of vulnerabilities in Dataprobe’s iBoot PDU:
CVE ID | CVSS Score | Description |
---|---|---|
CVE-2023-3259 | 9.8 | Deserialization of Untrusted Data – Allows attackers to submit malicious input leading to RCE. |
CVE-2023-3260 | 7.2 | OS Command Injection – Flaws enable executing arbitrary system commands as the root user. |
CVE-2023-3261 | 7.5 | Buffer Overflow – Memory corruption issue enables denial of service attacks. |
CVE-2023-3262 | 6.7 | Use of Hardcoded Credentials – Hardcoded credentials can allow attackers to easily gain unauthorized access. |
CVE-2023-3263 | 7.5 | Authentication Bypass by Alternate Name – Predictable session IDs allow bypassing authentication. |
POC: https://players.brightcove.net/21712694001/OsCjrUQjY_default/index.html?videoId=6333084784112
Chaining together the vulnerabilities in both CyberPower and Dataprobe products can allow attackers to gain complete control over these systems. Furthermore, the vulnerabilities could enable remote code execution, which can be leveraged to create persistent backdoors into the data center network.
If exploited at scale across multiple data centers, these vulnerabilities can cause massive disruptions through techniques like:
Powering off critical systems and infrastructure leads to extended outages costing millions per minute
Deploying malware across thousands of connected servers and systems to steal data or launch ransomware, DDoS, and other attacks at scale
Conducting espionage by nation-state actors to access sensitive information
According to the published report, the below products are prone to the vulnerabilities listed in the earlier sections.
CyberPower PowerPanel Enterprise versions prior to 2.6.9
Dataprobe iBoot PDU firmware versions prior to 1.44.08042023
Any data centers or enterprises using the vulnerable versions of these products are exposed to potential compromise and should patch immediately.
CyberPower and Dataprobe have released patches to address all the reported vulnerabilities in PowerPanel Enterprise and iBoot PDU, respectively. Customers using vulnerable versions should install the latest updates immediately to mitigate risks of potential exploitation.
Specifically, CyberPower has released PowerPanel Enterprise version 2.6.9 to address the vulnerabilities. Dataprobe has released iBoot PDU firmware version 1.44.08042023 to fix the flaws in their product.
In addition to updating the vulnerable software and firmware, customers should also take the following steps:
Restrict access to the management interfaces of PowerPanel Enterprise and iBoot PDU from only the internal organizational network. They should not be exposed to the public Internet, which increases the attack surface.
For iBoot PDU deployments, consider disabling remote access via Dataprobe’s cloud management platform if not absolutely required. This reduces potential attack vectors.
Reset all credentials associated with the appliances after updating them. Also, revoke access of any credentials that may have been compromised previously.
Closely monitor vendor notifications and subscribe to receive security updates promptly. Install patches as soon as new releases are available.
Consider additional monitoring and access controls to detect and prevent anomalous activity indicating potential exploitation attempts.
Trellix endpoint security products like EDR and network security solutions like Network Detection and Response can also detect attacks exploiting these vulnerabilities.
Regularly updating software and firmware, restricting unnecessary access, resetting credentials and subscribing to security alerts can help organizations stay protected against emerging threats targeting critical infrastructure like data centers.
The critical vulnerabilities recently disclosed in CyberPower and DataProbe’s data center infrastructure products like PowerPanel Enterprise and iBoot PDU could result in significant compromises if left unpatched. Customers are strongly advised to install the latest updates and follow recommended mitigation steps to protect against potential exploits targeting these vulnerabilities in CyberPower and DataProbe products. With data centers increasingly becoming prime targets, vendors must continue security research and patching to harden these foundational platforms powering critical business infrastructure.
We hope this post helps you understand the multiple vulnerabilities in CyberPower and DataProbe Products and their mitigations to lower the attack surface. We hope you like this post. Thanks for reading this post. Please share this post and help secure the digital world. Visit our website wordpress-755771-2552852.cloudwaysapps.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive updates like this.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.