I found the following APC FAQ article about Treck TCP/IP Vulnerabilities (Ripple20)
The latest firmware version for APC AP77xx ATS is 3.9.3 which is fixing above mentioned bug.
I manage quite a few these type of devices in various locations and in the past I did the following exercise which was a pain:
"Before beginning the update process, the unit should have the secondary (non‐loaded) input power sourceunplugged. Failure to do this WILL cause damage to the unit when it resets after updating."
At that time I followed this documentation: https://www.apc.com/us/en/faqs/FA156178/
Now, as new 3.9.3 has been released, should I follow the same procedure if the device is running on 3.9.2?
Or at this time can I perform upgrade remotely without removing the secondary input source?
Have a question? Please contact us with details, and we will respond.
Look through existing questions to find popular answers.
Want to know more about Exchange and its possibilities?
Discuss challenges in energy and automation with 30,000+ experts and peers.
Find answers in 10,000+ support articles to help solve your product and business challenges.
Find peer based solutions to your questions. Provide answers for fellow community members!
Register today for FREE
Already have an account?Log in