APC UPS/USV
APCUPSD Information Leak
What is it?
This script abuses an unauthenticated information leak in the apcupsd daemon. The apcupsd daemon is part of the APC UPS/USV chain, it's job is to shutdown or keep your servers surviving, as long as it has battery power left.
What information can be gathered?
- Operating System
- Version of APCUPSD
- Battery Status
- SerialNumber
- Firmware Version
- USV Model
- Shutdown times
and some more :)
Usage
There are two different supported modes in the daemon. Those are:
- status
- events
While status have detailed information about the daemon and its configuration itself, events covers power failures and alike.
./apcupsd_disclosure.py -h usage: apcupsd_disclosure.py 0.1 dash@undisclose.de June 2019
[-h] [-m MODE] -t TARGET [-p PORT]
``
Lil' tool for Information Disclosure of apcupsd
optional arguments: -h, --help show this help message and exit -m MODE, --mode MODE define the mode, two modes exist: "status" and "events", default is "status" -t TARGET, --target TARGET define the target -p PORT, --port PORT define the target port`
Get the status information (you do not need the -m option as status is default):
./apcupsd_disclosure.py -t 127.0.0.1 -m status
Get the events:
./apcupsd_disclosure.py -t 127.0.0.1 -m events
Shodan
Search: https://www.shodan.io/search?query=port%3A3551 Results: 26,000
Disclaimer
Don't do evil.