CVE-2022-47320

8.1 HIGH

📋 TL;DR

CVE-2022-47320 is a vulnerability in Dataprobe iBoot Power Distribution Units (PDUs) that allows unauthenticated attackers to execute arbitrary code via the discovery protocol. This affects organizations using these network-connected power management devices for data centers, industrial control systems, and critical infrastructure.

💻 Affected Systems

Products:
  • Dataprobe iBoot-PDU
Versions: All versions prior to firmware version 1.42.06162022
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with discovery protocol enabled (default configuration).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of power distribution infrastructure allowing attackers to remotely power cycle critical equipment, disrupt operations, and maintain persistent access to industrial networks.

🟠

Likely Case

Unauthorized power manipulation of connected devices leading to service disruption, equipment damage, and potential data loss.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH - Devices exposed to internet are trivially exploitable without authentication.
🏢 Internal Only: MEDIUM - Requires internal network access but exploitation is straightforward once access is obtained.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to port 9131/UDP but no authentication credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version 1.42.06162022

Vendor Advisory: https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf

Restart Required: Yes

Instructions:

1. Download firmware version 1.42.06162022 from Dataprobe support site. 2. Log into iBoot-PDU web interface. 3. Navigate to System > Firmware Upgrade. 4. Upload the firmware file. 5. Wait for automatic reboot and verification.

🔧 Temporary Workarounds

Disable Discovery Protocol

all

Turn off the vulnerable discovery service to prevent exploitation.

Web Interface: System > Network > Discovery Protocol > Disable

Network Segmentation

all

Isolate iBoot-PDU devices on separate VLAN with strict firewall rules.

Firewall rule: deny all traffic to port 9131/udp from untrusted networks

🧯 If You Can't Patch

  • Implement strict network access controls allowing only management traffic from authorized IPs
  • Monitor port 9131/UDP for unauthorized access attempts and anomalous traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: System > About. If version is earlier than 1.42.06162022, device is vulnerable.

Check Version:

Web interface navigation only - no CLI command available.

Verify Fix Applied:

Confirm firmware version shows 1.42.06162022 or later in System > About page.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to port 9131
  • Unexpected firmware modification logs
  • Multiple power cycle events from single source

Network Indicators:

  • UDP traffic to port 9131 from unauthorized sources
  • Unusual power control commands over network

SIEM Query:

source_port:9131 AND protocol:udp AND (NOT src_ip IN [authorized_management_ips])

🔗 References

📤 Share & Export