Thursday, April 3, 2025
Homecyber security46 New Vulnerabilities in Solar Inverter Systems Allow Attackers to Tamper with...

46 New Vulnerabilities in Solar Inverter Systems Allow Attackers to Tamper with Settings

Published on

SIEM as a Service

Follow Us on Google News

Forescout Vedere Labs has uncovered 46 new vulnerabilities in solar power systems, primarily affecting inverters from three leading manufacturers Sungrow, Growatt, and SMA.

These flaws, if exploited, could enable attackers to manipulate inverter settings, disrupt power grids, and compromise user privacy.

The research highlights that 80% of vulnerabilities disclosed in solar systems over the past three years were rated high or critical severity, with 30% scoring the maximum CVSS severity (9.8–10), allowing full system takeover.

Attack Scenarios and Mitigation

Exploiting these vulnerabilities could lead to large-scale grid destabilization.

For instance, attackers could hijack Growatt inverters via cloud-based takeovers or compromise Sungrow devices by exploiting insecure communication dongles.

Coordinated attacks could force grid shutdowns or blackouts, impacting critical infrastructure like hospitals and businesses.

Vendors have patched the reported issues, but Forescout emphasizes the need for stricter procurement standards, network segmentation, and continuous monitoring to mitigate risks.

Over half of global solar inverter manufacturers (53%) and storage providers (58%) are based in China, raising concerns about foreign-made components’ dominance in critical infrastructure.

The report urges utilities and regulators to address these systemic security gaps to prevent potential nation-state threats.

The findings underscore the urgent need to prioritize cybersecurity in renewable energy systems as they become integral to global power grids.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Selling SnowDog RAT Malware With Remote Control Capabilities Online

A sophisticated remote access trojan (RAT) dubbed SnowDog has surfaced on underground cybercrime forums, prompting alarms...

Authorities Shut Down Kidflix Child Abuse Platform in Major Takedown

In one of the most significant operations against child sexual exploitation in recent history,...

Massive GitHub Leak: 39M API Keys & Credentials Exposed – How to Strengthen Security

Over 39 million API keys, credentials, and other sensitive secrets were exposed on GitHub...

GoResolver: A Powerful New Tool for Analyzing Golang Malware

Analyzing malware has become increasingly challenging, especially with the growing popularity of programming languages...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Selling SnowDog RAT Malware With Remote Control Capabilities Online

A sophisticated remote access trojan (RAT) dubbed SnowDog has surfaced on underground cybercrime forums, prompting alarms...

Authorities Shut Down Kidflix Child Abuse Platform in Major Takedown

In one of the most significant operations against child sexual exploitation in recent history,...

Massive GitHub Leak: 39M API Keys & Credentials Exposed – How to Strengthen Security

Over 39 million API keys, credentials, and other sensitive secrets were exposed on GitHub...