TLStorm: Matsalolin Mahimmanci guda uku da suka shafi na'urorin Smart-UPS na APC

Masu binciken tsaro na Armis kwanan nan sun sanar da cewa sun gano lahani guda uku a cikin samar da wutar lantarki mara katsewa APC wanda ke ba da damar sarrafa nesa da sarrafa na'urar, kamar kashe wasu tashoshin jiragen ruwa ko amfani da ita don kai hare-hare kan wasu na'urori.

Ularfafawa Sunan suna TLStorm kuma yana shafar APC Smart-UPS (SCL, SMX, SRT series) da SmartConnect (SMT, SMTL, SCL, da SMX jerin).

Na'urorin Samar da Wutar Lantarki mara katsewa (UPS) suna ba da ikon ajiyar gaggawa don mahimman kadarorin manufa kuma ana iya samun su a cibiyoyin bayanai, wuraren masana'antu, asibitoci, da ƙari.

APC reshen Schneider Electric ce kuma tana daya daga cikin manyan masu samar da na'urorin UPS tare da na'urori sama da miliyan 20 da ake sayar da su a duk duniya. Idan aka yi amfani da su, waɗannan lahani, waɗanda ake yiwa lakabi da TLStorm, suna ba da damar cikakken kwace na'urorin Smart-UPS masu nisa da kuma ikon aiwatar da matsananciyar hare-hare ta hanyar yanar gizo. Dangane da bayanan Armis, kusan 8 cikin kamfanoni 10 suna fuskantar raunin TLStorm. Wannan shafin yanar gizon yana ba da cikakken bayani game da wannan bincike da abubuwan da ke tattare da shi.

A cikin rubutun blog an ambaci cewa biyu daga cikin lahani suna haifar da kwari a cikin aiwatar da ka'idar TLS akan na'urorin da aka sarrafa ta hanyar tsakiyar sabis na girgije na Schneider Electric.

da SmartConnect jerin na'urori suna haɗa ta atomatik zuwa sabis na girgije tsakiya lokacin farawa ko rasa haɗin kuma maharin da ba a tantance shi ba zai iya yin amfani da rauni kuma ya sami iko jimlar akan na'urar ta hanyar aika fakiti na musamman zuwa UPS.

  • CVE-2022-22805: Buffer ambaliya a cikin fakitin lambar sake haɗawa da aka yi amfani da su lokacin sarrafa hanyoyin haɗin gwiwa. Batun yana faruwa ne ta hanyar buffer bayanai yayin sarrafa rarrabuwar bayanan TLS. Ana samun sauƙin amfani da raunin ta hanyar kuskuren kuskure lokacin amfani da ɗakin karatu na Mocana nanoSSL: bayan dawo da kuskure, haɗin ba a rufe ba.
  • CVE-2022-22806: Keɓancewar tabbatarwa lokacin kafa zaman TLS wanda ya haifar da kuskuren jiha yayin tattaunawar haɗin gwiwa. Caching maɓallin TLS mara izini da ba a san shi ba da kuma watsi da lambar kuskuren da aka dawo da laburaren Mocana nanoSSL lokacin da aka karɓi fakiti tare da maɓalli mara komai ya sa ya yiwu a kwaikwayi kasancewa uwar garken Lantarki na Schneider ba tare da shiga cikin tabbaci da matakin musayar maɓalli ba.

Na uku yanayin rauni (CVE-2022-0715) yana da alaƙa da aiwatar da ba daidai ba na tabbatarwar firmware zazzagewa don sabuntawa kuma yana bawa maharin damar shigar da firmware da aka gyara ba tare da tabbatar da sa hannun dijital ba (ya nuna cewa ba a tabbatar da sa hannun dijital don firmware kwata-kwata ba, amma kawai ɓoye ɓoyewa tare da maɓalli da aka riga aka ƙayyade a cikin firmware ana amfani da shi).

Haɗe tare da raunin CVE-2022-22805, mai hari zai iya maye gurbin firmware. daga nesa ta hanyar nunawa azaman sabis na girgije na Schneider Electric ko ta hanyar haɓaka sabuntawa daga hanyar sadarwar gida.

Yin amfani da ɓarna a cikin hanyoyin sabunta firmware yana zama daidaitaccen aiki ga APTs, kamar yadda kwanan nan cikakken bayani a cikin nazarin Cyclops Blink malware, da kuskuren shigar da firmware na na'ura matsala ce mai maimaitawa a cikin tsarin da yawa. Rashin lahani na baya da aka gano ta hanyar Armis a cikin tsarin Swisslog PTS (PwnedPiper, CVE-2021-37160) ya kasance sakamakon irin wannan nau'in aibi.

Bayan samun damar yin amfani da UPS, maharin na iya dasa lambar baya ko qeta akan na'urar, da kuma yin sabotage da kashe ikon masu amfani da mahimmanci, misali, kashe ikon tsarin sa ido na bidiyo a bankuna ko tallafin rayuwa. .

Schneider Electric ya shirya faci don magance matsaloli kuma yana shirya sabuntawar firmware. Don rage haɗarin sasantawa, ana kuma ba da shawarar canza kalmar sirri ta asali (“apc”) akan na'urori masu NMC (Katin Gudanar da Yanar Gizo) da shigar da takardar shaidar SSL ta dijital da aka sanya hannu, da kuma hana damar shiga UPS a cikin Tacewar zaɓi kawai. zuwa adireshi a cikin girgijen Schneider Electric.

Finalmente Idan kuna da sha'awar sanin game da shi, zaka iya bincika bayanan a cikin bin hanyar haɗi.


Bar tsokaci

Your email address ba za a buga. Bukata filayen suna alama da *

*

*

  1. Wanda ke da alhakin bayanan: Miguel Ángel Gatón
  2. Manufar bayanan: Sarrafa SPAM, sarrafa sharhi.
  3. Halacci: Yarda da yarda
  4. Sadarwar bayanan: Ba za a sanar da wasu bayanan ga wasu kamfanoni ba sai ta hanyar wajibcin doka.
  5. Ajiye bayanai: Bayanin yanar gizo wanda Occentus Networks (EU) suka dauki nauyi
  6. Hakkoki: A kowane lokaci zaka iyakance, dawo da share bayanan ka.