{"id":45629,"date":"2022-03-09T04:36:00","date_gmt":"2022-03-09T04:36:00","guid":{"rendered":"http:\/\/169cb74f-f975-4bb6-b872-28efe8053bed"},"modified":"2022-03-09T04:36:00","modified_gmt":"2022-03-09T04:36:00","slug":"ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/","title":{"rendered":"UPS flaws allow for remote code execution and remote fire-based interruptions"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/41e35a5cede920ed344e95c5d9ead0e70addafe9\/2022\/03\/09\/2e9d87c6-6250-46dd-8518-4be9db8f76dd\/apc-ups-tlstorm.png?width=1200&amp;fit=bounds&amp;format=pjpg&amp;auto=webp\" class alt=\"apc-ups-tlstorm.png\" height=\"auto\" width=\"1200\"><\/span><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Armis <\/span><\/figcaption><\/figure>\n<p>Security researchers at Armis have <a href=\"https:\/\/www.armis.com\/research\/tlstorm\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">detailed<\/a> a trio of vulnerabilities in so-called Smart-UPS devices sold by Schneider Electric subsidiary APC that allow for unnoticeable remote code execution, replacing of firmware, and potentially burning out the entire unit. <\/p>\n<p>Naturally in 2022, the flaws in the system stem from a combination of bad TLS implementation and being able to be controlled through a cloud-based system in newer devices. <\/p>\n<p>&#8220;Since the TLS attack vector can originate from the internet, these vulnerabilities can act as a gateway to the internal corporate network. Bad actors can use the TLS state confusion to identify themselves as the Schneider Electric cloud and collect information about the UPS behind the corporate firewall,&#8221; Armis said. <\/p>\n<p>&#8220;They can then remotely update the UPS firmware and use the UPS as the entry point for a ransomware attack or any other type of malicious operation.&#8221; <\/p>\n<p>If a TLS connection has an error, rather than closing the connection as recommended by Mocana nanoSSL library writers, APC ignores some of the errors, which leaves the connection open and the library in a state it is not built to handle. <\/p>\n<p>&#8220;Ignoring the nanoSSL library errors causes the UPS to cache the TLS key in its uninitialized state,&#8221; Arris said. <\/p>\n<p>&#8220;When an attacker uses the TLS resumption functionality, the uninitialized key (all zero) is fetched from the cache and the attacker can communicate with the device as if it was a genuine Schneider Electric server. As a seemingly verified server, the attacker can issue a firmware upgrade command and remotely execute code over the UPS device.&#8221; <\/p>\n<p>Additionally, all Smart-UPS devices use the same symmetric key for encryption and decryption, and it can be extracted from the devices. As a bonus, the devices do not check if any firmware is signed, allowing attackers to remain persistently on the device. <\/p>\n<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/\" class=\"lazy\" alt=\"armis-apc-ups-fire.png\" data-original=\"https:\/\/www.zdnet.com\/a\/img\/resize\/bf1b86d1a9e12dbbb4c5de93ae4653c19866257c\/2022\/03\/09\/8f09f565-aa07-4159-bef2-2687635ab279\/armis-apc-ups-fire.png?fit=bounds&amp;format=pjpg&amp;auto=webp\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/bf1b86d1a9e12dbbb4c5de93ae4653c19866257c\/2022\/03\/09\/8f09f565-aa07-4159-bef2-2687635ab279\/armis-apc-ups-fire.png?fit=bounds&amp;format=pjpg&amp;auto=webp\" class alt=\"armis-apc-ups-fire.png\"><\/span><\/noscript><figcaption readability=\"1\"><span class=\"caption\" readability=\"2\"><\/p>\n<p>In the words of the Bloodhound Gang: We don&#8217;t need no water.<\/p>\n<p><\/span><span class=\"credit\"> Image: Armis <\/span><\/figcaption><\/figure>\n<p>On the extreme physical end of the equation, replacing the firmware allows an attacker bypass software-based physical protections, such as a short circuit alert turning off the UPS. <\/p>\n<p>&#8220;By using our RCE vulnerability we were able to bypass the software protection and let the current spike periods run over and over until the DC link capacitor heated up to ~150 degrees celsius (~300F), which caused the capacitor to burst and brick the UPS in a cloud of electrolyte gas, causing collateral damage to the device,&#8221; the researchers state in a <a href=\"https:\/\/info.armis.com\/rs\/645-PDC-047\/images\/Armis-TLStorm-WP%20%281%29.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">white paper<\/a> [PDF]. <\/p>\n<p>&#8220;The exploitation risk is no longer limited to the IT world &#8212; an attacker can turn the UPS to a physical weapon. From a cyber security point of view, these kinds of systems must be handled as a flammable substance that sits in the heart of an organization.&#8221; <\/p>\n<p>Armis recommends users install the patches from Schneider Electric, and use access control lists to restrict and encrypt communications with the UPS to management devices and Schneider Electric Cloud. If the device has a network management card, Armis recommends changing the default password from &#8220;apc&#8221; to something else, and installing a publicly-signed certificate to prevent password sniffing. <\/p>\n<p>The security company said it believes 80% of organisations are vulnerable, with healthcare organisations hitting over 92% with a vulnerable device and retail just behind on 89%. <\/p>\n<p><em><strong>Updated at 3:52pm AEST, 9 March 2022: <\/strong>Clarified technical information.&nbsp;<\/em><\/p>\n<h3>Related Coverage<\/h3>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hooking up uninterruptible power supplies with TLS implementation errors automatically to a cloud service could potentially lead to a burning sensation.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-45629","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UPS flaws allow for remote code execution and remote fire-based interruptions 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UPS flaws allow for remote code execution and remote fire-based interruptions 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-09T04:36:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/41e35a5cede920ed344e95c5d9ead0e70addafe9\/2022\/03\/09\/2e9d87c6-6250-46dd-8518-4be9db8f76dd\/apc-ups-tlstorm.png?width=1200&amp;fit=bounds&amp;format=pjpg&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"UPS flaws allow for remote code execution and remote fire-based interruptions\",\"datePublished\":\"2022-03-09T04:36:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\\\/\"},\"wordCount\":564,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/41e35a5cede920ed344e95c5d9ead0e70addafe9\\\/2022\\\/03\\\/09\\\/2e9d87c6-6250-46dd-8518-4be9db8f76dd\\\/apc-ups-tlstorm.png?width=1200&amp;fit=bounds&amp;format=pjpg&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\\\/\",\"name\":\"UPS flaws allow for remote code execution and remote fire-based interruptions 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/41e35a5cede920ed344e95c5d9ead0e70addafe9\\\/2022\\\/03\\\/09\\\/2e9d87c6-6250-46dd-8518-4be9db8f76dd\\\/apc-ups-tlstorm.png?width=1200&amp;fit=bounds&amp;format=pjpg&amp;auto=webp\",\"datePublished\":\"2022-03-09T04:36:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/41e35a5cede920ed344e95c5d9ead0e70addafe9\\\/2022\\\/03\\\/09\\\/2e9d87c6-6250-46dd-8518-4be9db8f76dd\\\/apc-ups-tlstorm.png?width=1200&amp;fit=bounds&amp;format=pjpg&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/41e35a5cede920ed344e95c5d9ead0e70addafe9\\\/2022\\\/03\\\/09\\\/2e9d87c6-6250-46dd-8518-4be9db8f76dd\\\/apc-ups-tlstorm.png?width=1200&amp;fit=bounds&amp;format=pjpg&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UPS flaws allow for remote code execution and remote fire-based interruptions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UPS flaws allow for remote code execution and remote fire-based interruptions 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/","og_locale":"en_US","og_type":"article","og_title":"UPS flaws allow for remote code execution and remote fire-based interruptions 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-09T04:36:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/41e35a5cede920ed344e95c5d9ead0e70addafe9\/2022\/03\/09\/2e9d87c6-6250-46dd-8518-4be9db8f76dd\/apc-ups-tlstorm.png?width=1200&amp;fit=bounds&amp;format=pjpg&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"UPS flaws allow for remote code execution and remote fire-based interruptions","datePublished":"2022-03-09T04:36:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/"},"wordCount":564,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/41e35a5cede920ed344e95c5d9ead0e70addafe9\/2022\/03\/09\/2e9d87c6-6250-46dd-8518-4be9db8f76dd\/apc-ups-tlstorm.png?width=1200&amp;fit=bounds&amp;format=pjpg&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/","url":"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/","name":"UPS flaws allow for remote code execution and remote fire-based interruptions 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/41e35a5cede920ed344e95c5d9ead0e70addafe9\/2022\/03\/09\/2e9d87c6-6250-46dd-8518-4be9db8f76dd\/apc-ups-tlstorm.png?width=1200&amp;fit=bounds&amp;format=pjpg&amp;auto=webp","datePublished":"2022-03-09T04:36:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/41e35a5cede920ed344e95c5d9ead0e70addafe9\/2022\/03\/09\/2e9d87c6-6250-46dd-8518-4be9db8f76dd\/apc-ups-tlstorm.png?width=1200&amp;fit=bounds&amp;format=pjpg&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/41e35a5cede920ed344e95c5d9ead0e70addafe9\/2022\/03\/09\/2e9d87c6-6250-46dd-8518-4be9db8f76dd\/apc-ups-tlstorm.png?width=1200&amp;fit=bounds&amp;format=pjpg&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ups-flaws-allow-for-remote-code-execution-and-remote-fire-based-interruptions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"UPS flaws allow for remote code execution and remote fire-based interruptions"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45629"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45629\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}