Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Researchers reveal 46 critical shortcomings in sunny inverters from Sungrow, Growatt and SMA
Global Security

Researchers reveal 46 critical shortcomings in sunny inverters from Sungrow, Growatt and SMA

AdminBy AdminMarch 28, 2025No Comments4 Mins Read
Critical Flaws in Solar Inverters
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 28, 2025Red LakshmananOperational technology / vulnerability

Critical shortcomings in solar inventories

Cybersecurity researchers have discovered 46 new safety deficiencies in three solar -sellers, Sungrow, Growatt and SMAs, which can be used by a bad actor to confiscate devices or remote code, creating serious risks for electrical networks.

The vulnerabilities were collectively named Sun: Down by forescout vedere labs.

“New vulnerabilities can be used to execute arbitrary commands on devices or cloud provider, consider, gain a foothold in the supplier’s infrastructure or take control of the inverter owners’ device”, company company, company – Note In a report that shared with Hacker News.

Cybersecurity

Some of the notable flaws are below – below –

  • Attackers can upload .aspx files to be executed web -server SMA (Sunnyportal (.) Com), which will lead to the remote code
  • Non -false attackers can enroll the user via open “server.growatt.com/usercenter.do” final point
  • Invalid attackers can get a list of plants owned by other users, as well as arbitrary devices through the final point “server-api.growatt.com/newtwoeicapi.do”, leading to devices
  • Invalid attackers can get a serial reasonable counter number using the true username via “server-api.growatt.com/newplantapi.do”
  • Non -false attackers can get information about EV charger information, energy consumption information and other sensitive data using the final point “evcharge.growatt.com/ocpp”, and remotely customize the charger and get the firmware, causing the disclosure and physical damage
  • A App Android Related Sungrow uses a dangerous AES key for encrypted client data, opening the door to the script when the attacker can intercept and decrypt the connection between the mobile app and isolarcloud
  • A App Android Related to Sungrow clearly ignores certificates and vulnerable to enemy attacks (AITM)
  • Winet Webui Sungrow contains password with hard
  • Several vulnerabilities in Sungrow when processing MQT messages that can lead to remote code or conditions of service (DOS)

“The attacker who received control over the Sungrow, Growatt and SMA Inverters Fleet, using recently discovered vulnerabilities, can control sufficient force to cause the volatility of these power grids and other major,” Forescout said.

In the hypothetical scenario of the attacker focused on Growatt inverters, the actor threats can guess the real names of accounts through open API, hide the accounts, dropping their passwords in the default “123456” and perform the following exploitation.

Critical shortcomings in solar inventories

Worse, the inheritance fleet can be controlled as Botten to strengthen the attack and harm the network, which will cause network violations and potential shutdouts. All suppliers have since address a Certain problems After responsible disclosure of information.

“As attackers can control entire fleet of devices with the influence of energy production, they can change their settings to send more or less energy to the network at a certain time,” said the forecute, adding recently detected risk deficiencies that expose a network of cyber-physical ransom attacks.

Daniel Dos Santos, Head of Research in Forescout Vedere Labs, said the risks mitigation requires strict safety requirements when purchasing solar equipment, conducting regular risk assessments and providing full network visibility to these devices.

The disclosure of information occurs because the monitoring of production lines revealed serious security shortcomings made by the Japanese company Inaba Denki Sangyo, which could be used for remote observation and prevent production stops.

Cybersecurity

Vulnerabilities remain unwavering but the supplier has called for customers To restrict Internet access and limit, make sure such devices will be installed in a safe, limited area available only to authorized staff.

“These deficiencies allow different attacks, allowing an unauthorized attacker remotely and secretly accessing live frames for observation or violation of recording the cessation of production line that impede the capture of critical moments,” Nozomi Networks – Note.

In recent months, the Protective Technology Company (OT) also told about several security defects in GE Vernova N60 Network Relay. Zettler 130.8005 industrial gatewayand Wago 750-8216/025-001 Programmable Logic Controller (PLC) This can be armed with an attacker to take full control of the devices.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.