{"id":31451,"date":"2023-08-12T19:00:00","date_gmt":"2023-08-12T19:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=31451"},"modified":"2023-08-11T19:51:19","modified_gmt":"2023-08-11T19:51:19","slug":"dcim-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/","title":{"rendered":"Power Management Vulnerabilities Could Shut Down Data Centers: Researchers"},"content":{"rendered":"\n<p>Trellix researchers are disclosing a number of critical data center power management platform vulnerabilities at DEFCON 2023 today.<\/p>\n\n\n\n<p>The vulnerabilities &#8220;could allow attackers to shut down entire data centers in minutes, slowly infect entire data center deployments to steal key data and information, or utilize compromised resources to initiate massive attacks at a global scale,&#8221; Sam Quinn and Jesse Chick of the Trellix Advanced Research Center wrote in a blog accompanying their <a href=\"https:\/\/forum.defcon.org\/node\/245754\" target=\"_blank\" rel=\"noreferrer noopener\">presentation<\/a>.<\/p>\n\n\n\n<p>The Trellix researchers investigated several data center software platforms and hardware technologies as part of a U.S. effort to secure critical infrastructure. They found four critical vulnerabilities in CyberPower&#8217;s Data Center Infrastructure Management (DCIM) platform and five critical vulnerabilities in Dataprobe&#8217;s iBoot Power Distribution Unit (PDU).<\/p>\n\n\n\n<p>CyberPower offers power protection and management systems for computer and server technologies. The CyberPower DCIM platform lets IT teams manage, configure and monitor the infrastructure within a data center through the cloud, &#8220;serving as a single source of information and control for all devices.&#8221;<\/p>\n\n\n\n<p>Quinn and Chick said these platforms &#8220;are commonly used by companies managing on-premise server deployments to larger, co-located data centers \u2013 like those from major cloud providers AWS, Google Cloud, Microsoft Azure, etc.&#8221;<\/p>\n\n\n\n<p>Dataprobe&#8217;s power management products help businesses monitor and control their networks typically in small to mid-sized data centers and SMBs managing on-premises server deployments. &#8220;Their iBoot PDU allows administrators to manage the power supply to their devices and equipment remotely, via a simple and easy to use web browser application,&#8221; the researchers noted.<\/p>\n\n\n\n<p>Here are the vulnerabilities they discovered, including their CVEs, CVSS scores, and a brief description of each:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CyberPower DCIM:<\/strong><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CVE-2023-3264: Use of Hard-coded Credentials (CVSS 6.7)<\/li>\n\n\n\n<li>CVE-2023-3265: Improper Neutralization of Escape, Meta, or Control Sequences (Auth Bypass; CVSS 7.2)<\/li>\n\n\n\n<li>CVE-2023-3266: Improperly Implemented Security Check for Standard (Auth Bypass; CVSS 7.5)<\/li>\n\n\n\n<li>CVE-2023-3267: OS Command Injection (Authenticated RCE; CVSS 7.5)<\/li>\n\n\n\n<li><strong>Dataprobe iBoot PDU:<\/strong><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CVE-2023-3259: Deserialization of Untrusted Data (Auth Bypass; CVSS 9.8)<\/li>\n\n\n\n<li>CVE-2023-3260: OS Command Injection (Authenticated RCE; CVSS 7.2)<\/li>\n\n\n\n<li>CVE-2023-3261: Buffer Overflow (DOS; CVSS 7.5)<\/li>\n\n\n\n<li>CVE-2023-3262: Use of Hard-coded Credentials (CVSS 6.7)<\/li>\n\n\n\n<li>CVE-2023-3263: Authentication Bypass by Alternate Name (Auth Bypass; CVSS 7.5)<\/li>\n<\/ul>\n\n\n\n<p>The researchers said the vulnerabilities could give threat actors authenticated access to these data center power management systems, &#8220;which alone could be leveraged to commit catastrophic damage. However, the exploits go even further in allowing for remote code injection on the data center hardware to create a backdoor on the device, and an entry point to the broader network of connected data center devices and enterprise systems.&#8221;<\/p>\n\n\n\n<p>Potential attacks include:<\/p>\n\n\n\n<p><strong>Power Off:<\/strong> &#8220;Even the simple act of turning the data center off could cause massive damage,&#8221; the researchers said. With a simple &#8220;flip of a switch,&#8221; threat actors could shut down data centers.<\/p>\n\n\n\n<p><strong>Malware at Scale:<\/strong> Using these platforms to create a backdoor on data center equipment gives threat actors &#8220;a foothold to compromise systems at a massive scale \u2013 in the data center itself and for the business networks that access these servers. This malware could be leveraged for unprecedented <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware\/\">ransomware<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-ddos-attacks\/\">DDoS<\/a> or <a href=\"https:\/\/www.esecurityplanet.com\/threats\/cisa-microsoft-warn-of-wiper-malware\/\">Wiper<\/a> attacks that would completely dwarf SuxNet, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/cloudflare-mirai-botnet-ddos-attack\/\">Mirai BotNet<\/a>, or <a href=\"https:\/\/www.esecurityplanet.com\/threats\/report-finds-nhs-wannacry-attacks-were-easily-avoidable\/\">WannaCry<\/a>.&#8221;<\/p>\n\n\n\n<p><strong>Digital Espionage:<\/strong> &#8220;Spyware installed in data centers across the world could be leveraged for extreme cyberespionage,&#8221; they wrote.<\/p>\n\n\n\n<p><strong>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-a-network\/\">Network Protection: How to Secure a Network<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Black Hat, DEFCON Vulnerabilities &#8211; And a Challenge<\/h2>\n\n\n\n<p>The Trellix findings were just a few of the scores of vulnerabilities unveiled this week at the <a href=\"https:\/\/www.blackhat.com\/us-23\/briefings\/schedule\/\" target=\"_blank\" rel=\"noreferrer noopener\">Black Hat<\/a> and <a href=\"https:\/\/defcon.org\/html\/defcon-31\/dc-31-schedule.html\" target=\"_blank\" rel=\"noreferrer noopener\">DEFCON<\/a> conferences.<\/p>\n\n\n\n<p>Among the vulnerabilities were a <a href=\"https:\/\/downfall.page\/\" target=\"_blank\" rel=\"noreferrer noopener\">data leakage flaw<\/a> in Intel chips and a <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-24860\" target=\"_blank\" rel=\"noreferrer noopener\">denial of service vulnerability<\/a> in Microsoft Defender <a href=\"https:\/\/www.blackhat.com\/us-23\/briefings\/schedule\/index.html#edr--erase-data-remotely-by-cooking-an-unforgettable-byte-signature-dish-32630\" target=\"_blank\" rel=\"noreferrer noopener\">revealed<\/a> by SafeBreach researchers.<\/p>\n\n\n\n<p>And in a surprise announcement at Black Hat, the U.S. Defense Advanced Research Projects Agency (DARPA) <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2023\/08\/09\/biden-harris-administration-launches-artificial-intelligence-cyber-challenge-to-protect-americas-critical-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">announced<\/a> a two-year competition to develop AI cybersecurity tools, with nearly $20 million in prizes.<\/p>\n\n\n\n<p><em>eSecurity Planet Editor <a href=\"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/\">Paul Shread<\/a> contributed to this report<\/em><\/p>\n\n\n\n<p><strong>Further reading:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/trends\/ai-will-save-security-and-eliminate-jobs\/\"><strong>AI Will Save Security \u2013 And Eliminate Jobs<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\"><strong>Top Vulnerability Management Tools<\/strong><\/a><\/li>\n<\/ul>\n\n\n<div id=\"ta-campaign-widget-66d700381104d-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d700381104d\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d700381104d\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d700381104d\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d700381104d\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d700381104d\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d700381104d\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Trellix researchers are disclosing a number of critical data center power management platform vulnerabilities at DEFCON 2023 today. The vulnerabilities &#8220;could allow attackers to shut down entire data centers in minutes, slowly infect entire data center deployments to steal key data and information, or utilize compromised resources to initiate massive attacks at a global scale,&#8221; [&hellip;]<\/p>\n","protected":false},"author":318,"featured_media":31453,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2369,23707,10990,3790,3414,2478,730,4218,5277],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,31787,402,395,404,31780,380,31782,31775],"class_list":["post-31451","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cloud-security","tag-critical-infrastructure-cybersecurity","tag-critical-vulnerabilities","tag-cybersecurity","tag-network-security","tag-ransomware","tag-security","tag-vulnerabilities","tag-web-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-data-breach","b2b_product-ddos","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-hackers","b2b_product-patch-management","b2b_product-policy-compliance","b2b_product-threat-intelligence","b2b_product-web-applications-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Power Management Vulnerabilities Could Shut Down Data Centers: Researchers<\/title>\n<meta name=\"description\" content=\"Critical vulnerabilities in power management platforms could shut down data centers, and other Black Hat and DEFCON research.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Power Management Vulnerabilities Could Shut Down Data Centers: Researchers\" \/>\n<meta property=\"og:description\" content=\"Critical vulnerabilities in power management platforms could shut down data centers, and other Black Hat and DEFCON research.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-12T19:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-11T19:51:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp-dcim-vulnerabilities.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"916\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kaye Timonera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kaye Timonera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/\"},\"author\":{\"name\":\"Kaye Timonera\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f\"},\"headline\":\"Power Management Vulnerabilities Could Shut Down Data Centers: Researchers\",\"datePublished\":\"2023-08-12T19:00:00+00:00\",\"dateModified\":\"2023-08-11T19:51:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/\"},\"wordCount\":659,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp-dcim-vulnerabilities.png\",\"keywords\":[\"cloud security\",\"Critical Infrastructure Cybersecurity\",\"critical vulnerabilities\",\"cybersecurity\",\"network security\",\"ransomware\",\"security\",\"vulnerabilities\",\"Web security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/\",\"name\":\"Power Management Vulnerabilities Could Shut Down Data Centers: Researchers\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp-dcim-vulnerabilities.png\",\"datePublished\":\"2023-08-12T19:00:00+00:00\",\"dateModified\":\"2023-08-11T19:51:19+00:00\",\"description\":\"Critical vulnerabilities in power management platforms could shut down data centers, and other Black Hat and DEFCON research.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp-dcim-vulnerabilities.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp-dcim-vulnerabilities.png\",\"width\":1400,\"height\":916,\"caption\":\"Red danger light on a dark data center corridor.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Power Management Vulnerabilities Could Shut Down Data Centers: Researchers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f\",\"name\":\"Kaye Timonera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png\",\"caption\":\"Kaye Timonera\"},\"description\":\"eSecurity Planet and Datamation writer Kathryn Pearl Timonera has covered a wide range of industries in her career, including technology, cybersecurity, e-commerce, programming, aviation, finance, insurance, and business, and she managed the marketing team of a full stack development online school. After starting her career as a teacher, Kathryn now applies her talent for presenting information to technology and cybersecurity professionals.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/ktimonera\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Power Management Vulnerabilities Could Shut Down Data Centers: Researchers","description":"Critical vulnerabilities in power management platforms could shut down data centers, and other Black Hat and DEFCON research.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Power Management Vulnerabilities Could Shut Down Data Centers: Researchers","og_description":"Critical vulnerabilities in power management platforms could shut down data centers, and other Black Hat and DEFCON research.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/","og_site_name":"eSecurity Planet","article_published_time":"2023-08-12T19:00:00+00:00","article_modified_time":"2023-08-11T19:51:19+00:00","og_image":[{"width":1400,"height":916,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp-dcim-vulnerabilities.png","type":"image\/png"}],"author":"Kaye Timonera","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Kaye Timonera","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/"},"author":{"name":"Kaye Timonera","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f"},"headline":"Power Management Vulnerabilities Could Shut Down Data Centers: Researchers","datePublished":"2023-08-12T19:00:00+00:00","dateModified":"2023-08-11T19:51:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/"},"wordCount":659,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp-dcim-vulnerabilities.png","keywords":["cloud security","Critical Infrastructure Cybersecurity","critical vulnerabilities","cybersecurity","network security","ransomware","security","vulnerabilities","Web security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/","url":"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/","name":"Power Management Vulnerabilities Could Shut Down Data Centers: Researchers","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp-dcim-vulnerabilities.png","datePublished":"2023-08-12T19:00:00+00:00","dateModified":"2023-08-11T19:51:19+00:00","description":"Critical vulnerabilities in power management platforms could shut down data centers, and other Black Hat and DEFCON research.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp-dcim-vulnerabilities.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp-dcim-vulnerabilities.png","width":1400,"height":916,"caption":"Red danger light on a dark data center corridor."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/dcim-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Power Management Vulnerabilities Could Shut Down Data Centers: Researchers"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f","name":"Kaye Timonera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png","caption":"Kaye Timonera"},"description":"eSecurity Planet and Datamation writer Kathryn Pearl Timonera has covered a wide range of industries in her career, including technology, cybersecurity, e-commerce, programming, aviation, finance, insurance, and business, and she managed the marketing team of a full stack development online school. After starting her career as a teacher, Kathryn now applies her talent for presenting information to technology and cybersecurity professionals.","url":"https:\/\/www.esecurityplanet.com\/author\/ktimonera\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/31451"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/318"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=31451"}],"version-history":[{"count":2,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/31451\/revisions"}],"predecessor-version":[{"id":31455,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/31451\/revisions\/31455"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/31453"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=31451"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=31451"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=31451"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=31451"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=31451"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=31451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}