I mean, the article focuses more on how the UPSes have SNMP enabled network cards.
SNMP is Simple Network Management Protocol, which is for, well, simple network management, not computer administration, which are different things.
SNMP can definitely be an attack vector, so it’s generally considered good practice to disable it on any ports it’s not absolutely needed. Further, it’s mostly able to be abused for DDOS, although there are some possibilities for network penetration. Network, not computer, once again. Controlling the router isn’t the same as controlling the Server., although it can help you move towards controlling the Server. Still a lot of hoops to jump through from network to server.
Every election is run on a local level, and this would mean that in enough swing states, one of two things was happening: either the election cybersecurity team in all the states affected was technically incompetent or they were somehow in on it and all kept their mouths shut. Both of those are highly unlikely when it comes to the frequency at which this happened all over the country.
While you generally have a good point about script execution via a UPS, once again, does that mean every single cybersecurity team in every state affected was foolish enough to be giving a UPS administrator script execution capabilities? Because just executing a script doesn’t mean the user executing the script has admin rights. Once again, either every team was inept or somehow the famously loose-lipped Trump team was sitting on a zero-day exploit to gain admin access and somehow kept it quiet.
I don’t consider snmp to be a big issue, unless someone set up “public” with write access.
The ups software running on the windows machine would be running as system and would be able to execute whatever it wanted. Usually it’s connecting to the ups through some method (IP, usb serial) to figure out what state it’s in, how much runtime is remaining, and if it needs to execute any stored scripts.
How do you get a compromised UPS to upload scripts to the windows machine? That I’m not too sure about. I don’t think I’ve seen an ups management system that has that capability.
I mean, the article focuses more on how the UPSes have SNMP enabled network cards.
SNMP is Simple Network Management Protocol, which is for, well, simple network management, not computer administration, which are different things.
SNMP can definitely be an attack vector, so it’s generally considered good practice to disable it on any ports it’s not absolutely needed. Further, it’s mostly able to be abused for DDOS, although there are some possibilities for network penetration. Network, not computer, once again. Controlling the router isn’t the same as controlling the Server., although it can help you move towards controlling the Server. Still a lot of hoops to jump through from network to server.
Every election is run on a local level, and this would mean that in enough swing states, one of two things was happening: either the election cybersecurity team in all the states affected was technically incompetent or they were somehow in on it and all kept their mouths shut. Both of those are highly unlikely when it comes to the frequency at which this happened all over the country.
While you generally have a good point about script execution via a UPS, once again, does that mean every single cybersecurity team in every state affected was foolish enough to be giving a UPS administrator script execution capabilities? Because just executing a script doesn’t mean the user executing the script has admin rights. Once again, either every team was inept or somehow the famously loose-lipped Trump team was sitting on a zero-day exploit to gain admin access and somehow kept it quiet.
I don’t consider snmp to be a big issue, unless someone set up “public” with write access.
The ups software running on the windows machine would be running as system and would be able to execute whatever it wanted. Usually it’s connecting to the ups through some method (IP, usb serial) to figure out what state it’s in, how much runtime is remaining, and if it needs to execute any stored scripts.
How do you get a compromised UPS to upload scripts to the windows machine? That I’m not too sure about. I don’t think I’ve seen an ups management system that has that capability.