Dubbed TLStorm, in the widely used smart- UPS. Attackers could leverage the vulnerabilities to breach internal networks and deactivate Smart-UPS devices or manipulate the power flow to disrupt downstream devices or completely destroy the UPS.
One critical vulnerabilities relates to the authenticity validation or firmware files used by UPS devices.
Read more: https://www.armis.com/research/tlstorm/