Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • More Solar System Vulnerabilities Expose Power Grids to Hacking 
  • Security Week

More Solar System Vulnerabilities Expose Power Grids to Hacking 

Eduard Kovacs March 27, 2025
0

Researchers at cybersecurity firm Forescout have found dozens of vulnerabilities across solar power system products from Sungrow, Growatt and SMA, including flaws that can pose a serious threat to electrical grids.

Solar power has become increasingly important, particularly in the United States and Europe. However, these systems are often plagued by vulnerabilities that expose them to hacker attacks. Forescout has cataloged more than 90 vulnerabilities found over the past years in such products, and the company’s researchers recently identified 46 other flaws.

The security firm has analyzed products from the ten biggest solar power system vendors and found serious vulnerabilities in products from Sungrow, Growatt and SMA.

The main components of a solar plant are the solar panels, which generate DC power, and the inverters, which convert the DC power to AC power, enabling the harvested electricity to be fed into a commercial grid or used locally. 

In addition, modern solar plants have several cyber components, including a communication component that connects the system to the internet, a cloud service where data is sent for monitoring and control, and a mobile application that enables the user to interact with the cloud service. 

In the case of the SMA product, Forescout discovered a single vulnerability, which allows an attacker to upload a malicious file that will enable arbitrary code execution on the cloud platform server. 

[ Read: China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days ]

In Growatt products the researchers discovered 30 vulnerabilities that can be exploited for XSS attacks, to obtain potentially valuable information, take over devices, and cause physical damage to the system.

Advertisement. Scroll to continue reading.

More than a dozen vulnerabilities were found in Sungrow products, including insecure direct object reference (IDOR) issues, which can lead to sensitive information disclosure, as well as security holes allowing DoS attacks and remote code execution. 

Some of the vulnerabilities found by Forescout in these products can allow threat actors to hijack a significant number of inverters and abuse them for attacks on the power grid, including to potentially cause prolonged malfunctions. 

“We can hypothesize that an attacker that gained control of a large fleet of Sungrow, Growatt, and SMA inverters using the newly discovered vulnerabilities could control enough power to cause instability to [power grids],” Forescout said in a report.

In addition, the identified vulnerabilities could allow an attacker to obtain the personal information of these products’ users, exploit compromised devices to hijack other devices on the same network, and cause financial impact to grid operators through energy price manipulation and ransomware attacks. 

The impacted vendors have been notified. SMA and Sungrow patched all the vulnerabilities and published advisories to notify customers. In the case of Sungrow and SMA, the US cybersecurity agency CISA published its own advisories, noting that the impacted products are used in the energy sector worldwide. 

Growatt patched a few of the reported vulnerabilities, but most remained unfixed as of late February, according to Forescout. 

As NIST guidelines show, the general recommendations for securing solar systems are the same as for any other type of product, including changing default credentials, using access control mechanisms, updating software, performing backups, disabling unused features, and protecting communications.

In addition, Forescout has advised owners of commercial installations to include security requirements in the procurement process, conduct risk assessments when setting up devices, ensure that they have visibility into the system, and add these devices to separate network segments, which are continuously monitored for signs of malicious activity. 

Related: Vulnerabilities Exposed Widely Used Solar Power Systems to Hacking, Disruption

Related: Siemens Patches Power Grid Product Flaw Allowing Backdoor Deployment

About The Author

Eduard Kovacs

See author's posts

Original post here

Continue Reading

Previous: AI Security Firm Straiker Emerges From Stealth With $21M in Funding
Next: T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit

Trending Now

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide ransomware.jpg 1

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

May 23, 2025
SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection safeline.jpg 2

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

May 23, 2025
U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation botnet.jpg 3

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

May 23, 2025
CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs saas.jpg 4

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

May 23, 2025
GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts prompt.jpg 5

GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts

May 23, 2025
Oops: DanaBot Malware Devs Infected Their Own PCs Oops: DanaBot Malware Devs Infected Their Own PCs 6

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide ransomware.jpg 1
  • The Hacker News

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

May 23, 2025
SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection safeline.jpg 2
  • The Hacker News

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

May 23, 2025
U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation botnet.jpg 3
  • The Hacker News

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

May 23, 2025
CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs saas.jpg 4
  • The Hacker News

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

May 23, 2025
GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts prompt.jpg 5
  • The Hacker News

GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts

May 23, 2025
Oops: DanaBot Malware Devs Infected Their Own PCs Oops: DanaBot Malware Devs Infected Their Own PCs 6
  • Uncategorized

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Oops: DanaBot Malware Devs Infected Their Own PCs danabot.png 7
  • Krebs On Security

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025

You may have missed

ransomware.jpg
  • The Hacker News

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

[email protected] The Hacker News May 23, 2025 0
safeline.jpg
  • The Hacker News

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

[email protected] The Hacker News May 23, 2025 0
botnet.jpg
  • The Hacker News

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

[email protected] The Hacker News May 23, 2025 0
saas.jpg
  • The Hacker News

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

[email protected] The Hacker News May 23, 2025 0
Copyright © 2025 All rights reserved. | MoreNews by AF themes.