{}

Our Brands

{"support":{"yesButton":"yes","noButton":"no","feedback":{"title":"What can we do to improve?"},"submitButton":"Submit","successMessage":"Thank you for your feedback","title":"Did this answer your question?","feedbackPercentLabel":"of people found this helpful","captcha":{"error":"Please tick the box"}}}

Search FAQs

{"searchBar":{"inputPlaceholder":"Search by keyword or ask a question","searchBtn":"Search","error":"Please enter a keyword to search"}}

Is PowerChute Vulnerable to CVE-2011-3389?

Issue:
PowerChute is being flagged as Vulnerable to BEAST SSL security issue.

Products:
PowerChute Business Edition 9.1.0, 9.1.1
PowerChute Network Shutdown versions 3.0.0, 3.0.1, 3.1

Environment:
All supported OS

Cause:
**The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

Solution:

Upgrade PowerChute Business Edition to version 9.5 or above
Upgrade PowerChute Network Shutdown to version 4.x
Or
Upgrade browser to use a version that allows for TLS 1.2 support - disable SSL 2.0/3.0 and TLS 1.0/1.1 when accessing PowerChute UI.

** Information provided by National Vulnerability Database http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389
Users group

Discuss this topic with experts

Visit our Community for first-hand insights from experts and peers on this topic and more.
Explore more
Category:
Software
Explore more
Category:
Software

Can't find what you are looking for?

Reach out to our Customer Care team to receive information on technical support, assistance for complaints and more.