Cyber Security News

46 New Vulnerabilities in Solar Inverter Systems Allow Attackers to Tamper with Settings

Forescout Vedere Labs has uncovered 46 new vulnerabilities in solar power systems, primarily affecting inverters from three leading manufacturers Sungrow, Growatt, and SMA.

These flaws, if exploited, could enable attackers to manipulate inverter settings, disrupt power grids, and compromise user privacy.

The research highlights that 80% of vulnerabilities disclosed in solar systems over the past three years were rated high or critical severity, with 30% scoring the maximum CVSS severity (9.8–10), allowing full system takeover.

Attack Scenarios and Mitigation

Exploiting these vulnerabilities could lead to large-scale grid destabilization.

For instance, attackers could hijack Growatt inverters via cloud-based takeovers or compromise Sungrow devices by exploiting insecure communication dongles.

Coordinated attacks could force grid shutdowns or blackouts, impacting critical infrastructure like hospitals and businesses.

Vendors have patched the reported issues, but Forescout emphasizes the need for stricter procurement standards, network segmentation, and continuous monitoring to mitigate risks.

Over half of global solar inverter manufacturers (53%) and storage providers (58%) are based in China, raising concerns about foreign-made components’ dominance in critical infrastructure.

The report urges utilities and regulators to address these systemic security gaps to prevent potential nation-state threats.

The findings underscore the urgent need to prioritize cybersecurity in renewable energy systems as they become integral to global power grids.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Linux Lite 7.4 Final Released: Enhanced GUI and Bug Fixes

Linux Lite, a popular lightweight Linux distribution aimed at making Linux accessible to beginners, has…

11 minutes ago

Operation HollowQuill – Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov & Military Networks

In a recent revelation by SEQRITE Labs, a highly sophisticated cyber-espionage campaign, dubbed Operation HollowQuill,…

10 hours ago

Earth Alux Hackers Use VARGIET Malware to Target Organizations

A new wave of cyberattacks orchestrated by the advanced persistent threat (APT) group Earth Alux…

10 hours ago

“Lazarus Hackers Group” No Longer Refer to a Single APT Group But a Collection of Many Sub-Groups

The term "Lazarus Group," once used to describe a singular Advanced Persistent Threat (APT) actor,…

10 hours ago

DarkCloud: An Advanced Stealer Malware Sold on Telegram to Target Windows Data

DarkCloud, a highly advanced stealer malware, has emerged as a significant threat to Windows systems…

10 hours ago

Triton RAT Uses Telegram for Remote System Access and Control

Cado Security Labs has uncovered a new Python-based Remote Access Tool (RAT) named Triton RAT,…

10 hours ago