According to Armis, a complete remote takeover via the internet is possible as the devices are controlled through a cloud connection, potentially without even any signs of an attack through remote code execution. An exploitation could result in weaponized power outages or surges of battery function affecting both the power supply and other connected systems, as well as breaches of company data or installed malware.
Both vulns require no human interaction and can be exploited as a zero-click attack.
Armis said there’s currently no indication the flaws are being exploited in the wild. ®
Sorry not long on words, some of you probably have this stuff.