{"id":20723,"date":"2022-02-02T19:50:55","date_gmt":"2022-02-02T19:50:55","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=20723"},"modified":"2022-02-02T19:50:55","modified_gmt":"2022-02-02T19:50:55","slug":"data-center-management-apps-exposed-to-internet","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/","title":{"rendered":"Thousands of Data Center Management Apps Exposed to Internet"},"content":{"rendered":"<p>Tens of thousands of applications that are critical to the operations of data centers around the globe are exposed to the internet, with many secured with default factory passwords, posing a significant cyber risk to enterprises worldwide.<\/p>\n<p>Researchers with cybersecurity firm Cyble this week said that along with the public-facing data center infrastructure management (DCIM) software, they also found intelligent monitoring devices, thermal cooling management and power monitors for racks vulnerable to cyberattacks.<\/p>\n<p>The discovery of the more than 20,000 DCIM software instances and products exposed to the internet makes it highly likely that there will be \u201cincreasing cyber threats towards data centers worldwide,\u201d investigators with Cyble Research Labs wrote in a <a href=\"https:\/\/blog.cyble.com\/2022\/01\/27\/data-centers-facing-risk-of-cyberattacks\/\" target=\"_blank\" rel=\"noopener\">blog post<\/a>.<\/p>\n<p>\u201cGlobally data centers are becoming faster, smarter, and highly scalable but this development comes at a price, as with great power comes significant responsibilities and greater risks of cyberattacks,\u201d they wrote. \u201cAs data centers work with the collaboration of multiple technologies and software, vulnerabilities and loopholes can be easily found by malicious hackers. Moreover, data centers are rapidly upgrading. Hence hackers are exploring new vectors to bypass the security parameters.\u201d<\/p>\n<p>See also: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n<h2><strong>Growing Presence of DCIM Software<\/strong><\/h2>\n<p>DCIM is becoming an increasingly important part of data center management. The software tools address both IT and facilities operations, managing and controlling such data center components as servers, storage, routers and switches, along with heating, ventilation and cooling (HVAC) systems, uninterruptible power supply (UPS) systems, sensors, transfer switches \u2013 used to redirect a power load to an alternate source \u2013 and server rack monitoring solutions.<\/p>\n<p>According to market research firm KVB Research, the global DCIM market is expected to grow an average of 21.7 percent a year through 2026, when it will <a href=\"https:\/\/www.kbvresearch.com\/data-center-infrastructure-management-market\/\" target=\"_blank\" rel=\"noopener\">hit $4.4 billion<\/a>. The analysts wrote that the rising demand for data center virtualization, the ongoing migration of business into private clouds and the drive to improve cost efficiencies within the data center are helping to fuel the market growth.<\/p>\n<p>Because of the reach DCIM software has in data centers, it is getting the attention of threat actors, according to the Cyble researchers. For example, hacktivists could launch an attack on a specific data center\u2019s HVAC system in retaliation for some actions by a person or group connected to the facility. <a href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-outlook-2022-ransomware-and-ai-attacks\/\">Ransomware gangs<\/a> could block IT and facilities managers from DCIM applications and demand money to regain access, and hackers could get access to highly sensitive data.<\/p>\n<p>State-sponsored groups could disrupt power to critical data center components and cause a shutdown of the site, they wrote.<\/p>\n<p>\u201cData centers are the most important critical infrastructure for the nation and the organization using the data center facilities,\u201d the researchers wrote. \u201cA successful attack on this vital sector can lead to the loss of a considerable amount of money. The data stored and processed in the data centers can be corrupted and destroyed, which can cause a severe impact on the organization\u2019s brand reputation. Hackers can even delete the traces of their attack by deleting the logs from &#8230; web consoles.\u201d<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/critical-infrastructure-protection-physical-cybersecurity\/\">Critical Infrastructure Protection: Physical and Cyber Security Both Matter<\/a><\/p>\n<h2><strong>Public-Facing Software a Threat<\/strong><\/h2>\n<p>Data centers also use many products from various vendors, which increases the scope of attack for cybercriminals. Security professionals told <em>eSecurity Planet<\/em> that allowing these applications to be exposed to the internet is a dangerous move by data center operators and vendors alike.<\/p>\n<p>\u201cThere can be no real security if physical security of a system is compromised,\u201d said John Bambenek, principal threat hunter for cybersecurity company Netenrich. \u201cThese systems provide attackers a good deal of insight into the physical layer of data center operations and, in some cases, allow them to make changes that can compromise the underlying systems. It\u2019s been a best practice not to put things on the Internet, accessible to the world and protected by default credentials since the \u201990s. This is laziness at its worst.\u201d<\/p>\n<blockquote><p>&#8216;Exposing that to the public internet is like allowing terrorists to direct air traffic control&#8217;<\/p><\/blockquote>\n<p>Sounil Yu, CISO for cybersecurity vendor JupiterOne, said that \u201cIt\u2019s easy to lose sight of these applications without a good asset management program. It\u2019s worse with\u00a0DCIM tools, since they are part of one\u2019s control plane. Exposing that to the public internet is like allowing terrorists to direct air traffic control.\u201d<\/p>\n<p>See also: <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-it-asset-management-tools-for-security\/\">Top IT Asset Management Tools for Security<\/a><\/p>\n<h2><strong>APC by Schneider, Sunbird, Liebert on List<\/strong><\/h2>\n<p>Cyble\u2019s researchers said they detected instances of software from Sunbird, Liebert, APC by Schneider, Vertiv and Device42 that could be accessed by threat actors on the outside. APC by Schneider accounted for more than half the public-facing instances found by the researchers.<\/p>\n<p>They also found instances of public-facing software from Device42, Liebert\u2019s CRV-iCOM cooling solution and smart UPS still running factory default passwords. They were \u201cable to find several instances exposed over the internet while investigating the scope of attacks on data centers all over the globe. Default passwords protected these data centers. Some of the products found were outdated, allowing hackers or malicious groups to exploit the data center\u2019s systems further.\u201d<\/p>\n<p>In addition to building and room security, monitoring server racks are critical as data storage, and processing equipment are installed in racks, the researchers noted. \u201cA change in external parameters could cause severe damage,&#8221; they said. &#8220;For example, an increase in temperature might cause the chips inside to melt and bring the entire system to a halt. Furthermore, the chips\u2019 processing power slows down and loses efficiency if they run too cold.&#8221;<\/p>\n<p>They found multiple exposed web interfaces used for rack monitoring, with the interfaces using default passwords, \u201cmaking it easy for a hacker to gain insights into a data center. As there are multiple sensors, power units, networking devices, CCTV cameras connected to these portals, there is a lot of scope for a hacker to gain sensitive information about the components within the data center and their working.\u201d<\/p>\n<h2><strong>Reconsider Web Exposure<\/strong><\/h2>\n<p>The Cyble researchers noted that even organizations that are already spending millions of dollars to protect their data centers and ensure there are no downtimes or security breaches need to take a holistic view of their facilities and look for openings that threat actors could exploit.<\/p>\n<p>Enterprises need to adopt a <a href=\"https:\/\/www.esecurityplanet.com\/products\/risk-management-software\/\">risk management<\/a> framework, such as the RMF framework from NIST, as well as embrace <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\">security awareness programs<\/a>, path vulnerabilities, implement <a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\">access controls<\/a> on connected systems, launch <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">network segmentation<\/a> efforts and run regular audits. The researchers also urged strong <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\">password<\/a> policies, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-conduct-a-vulnerability-assessment-steps-toward-better-cybersecurity\/\">vulnerability assessment<\/a> programs and using <a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\">threat intelligence<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-20727\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/02\/Cyble-framework.png\" alt=\"NIST RMF framework\" width=\"859\" height=\"713\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Cyble-framework.png 859w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Cyble-framework-300x249.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Cyble-framework-768x637.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Cyble-framework-150x125.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Cyble-framework-696x578.png 696w\" sizes=\"(max-width: 859px) 100vw, 859px\" \/><\/p>\n<p>And reconsider using applications and instances exposed to the internet.<\/p>\n<p>\u201cPublic-facing web instances are a significant threat for the critical sectors which go unaddressed by the security teams,\u201d they wrote. \u201cDoing so puts the complete environment at risk of cyber-attack. Checking assets exposure is very important in these sectors.\u201d<\/p>\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/use-mitre-attck-to-understand-attacker-behavior\/\">How to Use MITRE ATT&amp;CK to Understand Attacker Behavior<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6ed9c8173f-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ed9c8173f\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ed9c8173f\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ed9c8173f\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ed9c8173f\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ed9c8173f\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ed9c8173f\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Tens of thousands of applications that are critical to the operations of data centers around the globe are exposed to the internet, with many secured with default factory passwords, posing a significant cyber risk to enterprises worldwide. Researchers with cybersecurity firm Cyble this week said that along with the public-facing data center infrastructure management (DCIM) [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":20725,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14,15],"tags":[],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[377,375,379],"class_list":["post-20723","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","category-threats","b2b_audience-awareness-and-consideration","b2b_product-gateway-and-network-security","b2b_product-security-management","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Thousands of Data Center Management Apps Exposed to Internet | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Cyble researchers found more than 20,000 unprotected DCIM tools exposed to the internet. Here&#039;s how to control risk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Thousands of Data Center Management Apps Exposed to Internet | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Cyble researchers found more than 20,000 unprotected DCIM tools exposed to the internet. Here&#039;s how to control risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-02T19:50:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Cyble-DCIM-e1643828468582.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Thousands of Data Center Management Apps Exposed to Internet\",\"datePublished\":\"2022-02-02T19:50:55+00:00\",\"dateModified\":\"2022-02-02T19:50:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/\"},\"wordCount\":1157,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Cyble-DCIM-e1643828468582.png\",\"articleSection\":[\"Networks\",\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/\",\"name\":\"Thousands of Data Center Management Apps Exposed to Internet | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Cyble-DCIM-e1643828468582.png\",\"datePublished\":\"2022-02-02T19:50:55+00:00\",\"dateModified\":\"2022-02-02T19:50:55+00:00\",\"description\":\"Cyble researchers found more than 20,000 unprotected DCIM tools exposed to the internet. Here's how to control risk.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Cyble-DCIM-e1643828468582.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Cyble-DCIM-e1643828468582.png\",\"width\":900,\"height\":455,\"caption\":\"DCIM system\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Thousands of Data Center Management Apps Exposed to Internet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Thousands of Data Center Management Apps Exposed to Internet | eSecurity Planet","description":"Cyble researchers found more than 20,000 unprotected DCIM tools exposed to the internet. Here's how to control risk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/","og_locale":"en_US","og_type":"article","og_title":"Thousands of Data Center Management Apps Exposed to Internet | eSecurity Planet","og_description":"Cyble researchers found more than 20,000 unprotected DCIM tools exposed to the internet. Here's how to control risk.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/","og_site_name":"eSecurity Planet","article_published_time":"2022-02-02T19:50:55+00:00","og_image":[{"width":900,"height":455,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Cyble-DCIM-e1643828468582.png","type":"image\/png"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Thousands of Data Center Management Apps Exposed to Internet","datePublished":"2022-02-02T19:50:55+00:00","dateModified":"2022-02-02T19:50:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/"},"wordCount":1157,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Cyble-DCIM-e1643828468582.png","articleSection":["Networks","Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/","url":"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/","name":"Thousands of Data Center Management Apps Exposed to Internet | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Cyble-DCIM-e1643828468582.png","datePublished":"2022-02-02T19:50:55+00:00","dateModified":"2022-02-02T19:50:55+00:00","description":"Cyble researchers found more than 20,000 unprotected DCIM tools exposed to the internet. Here's how to control risk.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Cyble-DCIM-e1643828468582.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Cyble-DCIM-e1643828468582.png","width":900,"height":455,"caption":"DCIM system"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/data-center-management-apps-exposed-to-internet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Thousands of Data Center Management Apps Exposed to Internet"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20723"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=20723"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20723\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20725"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=20723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=20723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=20723"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=20723"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=20723"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=20723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}