Monday, March 31, 2025

Researchers Uncover 46 Essential Flaws in Photo voltaic Inverters From Sungrow, Growatt, and SMA


Mar 28, 2025Ravie LakshmananOperational Expertise / Vulnerability

Cybersecurity researchers have disclosed 46 new safety flaws in merchandise from three photo voltaic inverter distributors, Sungrow, Growatt, and SMA, that might be exploited by a foul actor to grab management of gadgets or execute code remotely, posing extreme dangers to electrical grids.

The vulnerabilities have been collectively codenamed SUN:DOWN by Forescout Vedere Labs.

“The brand new vulnerabilities will be exploited to execute arbitrary instructions on gadgets or the seller’s cloud, take over accounts, achieve a foothold within the vendor’s infrastructure, or take management of inverter house owners’ gadgets,” the corporate mentioned in a report shared with The Hacker Information.

Cybersecurity

A number of the notable flaws recognized are listed beneath –

  • Attackers can add .aspx information that will likely be executed by the net server of SMA (sunnyportal[.]com), leading to distant code execution
  • Unauthenticated attackers can carry out username enumeration through the uncovered “server.growatt.com/userCenter.do” endpoint
  • Unauthenticated attackers can acquire the listing of crops belonging to different customers in addition to arbitrary gadgets through the “server-api.growatt.com/newTwoEicAPI.do” endpoint, leading to machine takeover
  • Unauthenticated attackers can acquire the serial variety of a sensible meter utilizing a legitimate username through the “server-api.growatt.com/newPlantAPI.do” endpoint, leading to account takeover
  • Unauthenticated attackers can acquire details about EV chargers, power consumption info, and different delicate information through the “evcharge.growatt.com/ocpp” endpoint, in addition to remotely configure EV chargers and procure info associated to firmware, leading to info disclosure and bodily injury
  • The Android software related to Sungrow makes use of an insecure AES key to encrypt consumer information, opening the door to a state of affairs the place an attacker can intercept and decrypt communications between the cell app and iSolarCloud
  • The Android software related to Sungrow explicitly ignores certificates errors and is susceptible to adversary-in-the-middle (AitM) assaults
  • Sungrow’s WiNet WebUI accommodates a hard-coded password that can be utilized to decrypt all firmware updates
  • A number of vulnerabilities in Sungrow when dealing with MQTT messages that would lead to distant code execution or a denial-of-service (DoS) situation

“An attacker that gained management of a big fleet of Sungrow, Growatt, and SMA inverters utilizing the newly found vulnerabilities might management sufficient energy to trigger instability to those energy grids and different main ones,” Forescout mentioned.

In a hypothetical assault state of affairs concentrating on Growatt inverters, a risk actor might guess the actual account usernames by means of an uncovered API, hijack the accounts by resetting their passwords to the default “123456,” and carry out follow-on exploitation.

Critical Flaws in Solar Inverters

To make issues worse, the hijacked fleet of inverters might then be managed as a botnet to amplify the assault and inflict injury on the grid, resulting in grid disruption and potential blackouts. All of the distributors have since addressed the recognized points following accountable disclosure.

“As attackers can management complete fleets of gadgets with an influence on power manufacturing, they’ll alter their settings to ship roughly power to the grid at sure instances,” Forescout mentioned, including the newly found flaws danger exposing the grid to cyber-physical ransomware assaults.

Daniel dos Santos, Head of Analysis at Forescout Vedere Labs, mentioned mitigating the dangers requires implementing strict safety necessities when procuring photo voltaic tools, conducting common danger assessments, and making certain full community visibility into these gadgets.

The disclosure comes as critical safety flaws have been found in manufacturing line monitoring cameras made by Japanese firm Inaba Denki Sangyo that might be exploited for distant surveillance and stop recording manufacturing stoppages.

Cybersecurity

The vulnerabilities stay unpatched, however the vendor has urged prospects to limit web entry and restrict be certain that such gadgets are put in in a safe, restricted space that is accessible solely to licensed personnel.

“These flaws allow numerous assaults, permitting an unauthenticated attacker to remotely and secretly entry dwell footage for surveillance, or disrupt the recording of manufacturing line stoppages stopping the seize of crucial moments,” Nozomi Networks mentioned.

In current months, the operational know-how (OT) safety firm has additionally detailed a number of safety defects within the GE Vernova N60 Community Relay, Zettler 130.8005 industrial gateway, and Wago 750-8216/025-001 programmable logic controller (PLC) that might be weaponized by an attacker to take full management of the gadgets.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we submit.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com