Brief

Summary:

The View CSAF document reports a critical vulnerability in the CyberPower PowerPanel equipment, with a CVSS v3 score of 9.8. The vulnerabilities include:

1. Use of Hard-coded Password, Relative Path Traversal, Use of Hard-coded Credentials, Active Debug Code, Storing Passwords in a Recoverable Format, Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'), and Use of Hard-coded Cryptographic Key.
2. The affected versions of PowerPanel are 4.9.0 and prior.
3. Successful exploitation can result in an attacker bypassing authentication, forging JWT tokens, writing arbitrary files to the server, achieving code execution, and gaining access to services with the privileges of a PowerPanel application.
4. The recommended mitigation strategies include updating to PowerPanel Business v4.10.1 or later, minimizing network exposure, and using more secure remote access methods.
5. No known public exploitation has been reported to CISA at this time.

Risks:

Bypassing authentication and gaining administrator privileges
Forging JWT tokens to bypass authentication
Writing arbitrary files to the server and achieving code execution
Gaining access to services with the privileges of a PowerPanel application
Damaging the system or stealing sensitive information

Mitigation Strategies:

Upgrade to PowerPanel Business v4.10.1 or later
Minimize network exposure for all control system devices and/or systems
Use more secure remote access methods, such as Virtual Private Networks (VPNs)

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/Low attack complexity Vendor: CyberPower Equipment: PowerPanel Vulnerabilities: Use of Hard-coded Password, Relative Path Traversal, Use of Hard-coded Credentials, Active Debug Code, Storing Passwords in a Recoverable Format, Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’), Use of Hard-coded Cryptographic Key

This content is restricted.

Highlights content goes here...

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/Low attack complexity Vendor: CyberPower Equipment: PowerPanel Vulnerabilities: Use of Hard-coded Password, Relative Path Traversal, Use of Hard-coded Credentials, Active Debug Code, Storing Passwords in a Recoverable Format, Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’), Use of Hard-coded Cryptographic Key

This content is restricted.

Cybersecurity and Infrastructure Security Agency

Quick Insight
RADA.AI
RADA.AI
Hello! I'm RADA.AI - Regulatory Analysis and Decision Assistance. Your Intelligent guide for compliance and decision-making. How can i assist you today?
Suggested

Form successfully submitted. One of our GRI rep will contact you shortly

Thanking You!

Enter your Email

Enter your registered username/email id.

Enter your Email

Enter your email id below to signup.
Individual Plan
$125 / month OR $1250 / year
Features
Best for: Researchers, Legal professionals, Academics
Enterprise Plan
Contact for Pricing
Features
Best for: Law Firms, Corporations, Government Bodies