CVE-2018-7820

9.8 CRITICAL

📋 TL;DR

This vulnerability in APC UPS Network Management Card 2 allows remote attackers to view Remote Monitoring credentials in plaintext when Remote Monitoring is enabled and then disabled. It affects organizations using APC UPS devices with vulnerable network management cards. Attackers can potentially gain administrative access to power management systems.

💻 Affected Systems

Products:
  • APC UPS Network Management Card 2
Versions: AOS v6.5.6
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when Remote Monitoring is enabled and then disabled on affected devices.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative credentials, compromise UPS management systems, potentially causing power disruptions or using the device as a foothold into the network.

🟠

Likely Case

Attackers harvest credentials from vulnerable devices, gain unauthorized access to UPS management interfaces, and potentially disrupt power monitoring or configuration.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the UPS management interface only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the device interface and knowledge of the specific configuration sequence.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AOS v6.5.7 or later

Vendor Advisory: https://www.apc.com/salestools/CCON-BFQMXC/CCON-BFQMXC_R0_EN.pdf

Restart Required: Yes

Instructions:

1. Download latest firmware from APC website. 2. Log into UPS management interface. 3. Navigate to Firmware Update section. 4. Upload and apply firmware update. 5. Reboot device.

🔧 Temporary Workarounds

Disable Remote Monitoring

all

Permanently disable Remote Monitoring feature to prevent credential exposure.

Network Segmentation

all

Isolate UPS management interfaces on separate VLAN with strict access controls.

🧯 If You Can't Patch

  • Segment UPS management network from production systems
  • Implement strict firewall rules limiting access to UPS management interfaces

🔍 How to Verify

Check if Vulnerable:

Check device firmware version in web interface: System > About. If version is exactly 6.5.6, device is vulnerable.

Check Version:

Check via web interface or SNMP: snmpwalk -v2c -c community_string device_ip 1.3.6.1.4.1.318.1.1.1.1.2.3.0

Verify Fix Applied:

Verify firmware version shows 6.5.7 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts to UPS interface
  • Unauthorized configuration changes to Remote Monitoring settings

Network Indicators:

  • Unusual traffic to/from UPS management ports (80, 443, 161)
  • Credential harvesting attempts

SIEM Query:

source="ups_logs" AND (event="failed_login" OR event="config_change")

🔗 References

📤 Share & Export