Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • More Solar System Vulnerabilities Expose Power Grids to Hacking 
  • Security Week

More Solar System Vulnerabilities Expose Power Grids to Hacking 

Eduard Kovacs Published: March 27, 2025 | Updated: March 27, 2025 3 min read
0 views

Researchers at cybersecurity firm Forescout have found dozens of vulnerabilities across solar power system products from Sungrow, Growatt and SMA, including flaws that can pose a serious threat to electrical grids.

Solar power has become increasingly important, particularly in the United States and Europe. However, these systems are often plagued by vulnerabilities that expose them to hacker attacks. Forescout has cataloged more than 90 vulnerabilities found over the past years in such products, and the company’s researchers recently identified 46 other flaws.

The security firm has analyzed products from the ten biggest solar power system vendors and found serious vulnerabilities in products from Sungrow, Growatt and SMA.

The main components of a solar plant are the solar panels, which generate DC power, and the inverters, which convert the DC power to AC power, enabling the harvested electricity to be fed into a commercial grid or used locally. 

In addition, modern solar plants have several cyber components, including a communication component that connects the system to the internet, a cloud service where data is sent for monitoring and control, and a mobile application that enables the user to interact with the cloud service. 

In the case of the SMA product, Forescout discovered a single vulnerability, which allows an attacker to upload a malicious file that will enable arbitrary code execution on the cloud platform server. 

[ Read: China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days ]

In Growatt products the researchers discovered 30 vulnerabilities that can be exploited for XSS attacks, to obtain potentially valuable information, take over devices, and cause physical damage to the system.

Advertisement. Scroll to continue reading.

More than a dozen vulnerabilities were found in Sungrow products, including insecure direct object reference (IDOR) issues, which can lead to sensitive information disclosure, as well as security holes allowing DoS attacks and remote code execution. 

Some of the vulnerabilities found by Forescout in these products can allow threat actors to hijack a significant number of inverters and abuse them for attacks on the power grid, including to potentially cause prolonged malfunctions. 

“We can hypothesize that an attacker that gained control of a large fleet of Sungrow, Growatt, and SMA inverters using the newly discovered vulnerabilities could control enough power to cause instability to [power grids],” Forescout said in a report.

In addition, the identified vulnerabilities could allow an attacker to obtain the personal information of these products’ users, exploit compromised devices to hijack other devices on the same network, and cause financial impact to grid operators through energy price manipulation and ransomware attacks. 

The impacted vendors have been notified. SMA and Sungrow patched all the vulnerabilities and published advisories to notify customers. In the case of Sungrow and SMA, the US cybersecurity agency CISA published its own advisories, noting that the impacted products are used in the energy sector worldwide. 

Growatt patched a few of the reported vulnerabilities, but most remained unfixed as of late February, according to Forescout. 

As NIST guidelines show, the general recommendations for securing solar systems are the same as for any other type of product, including changing default credentials, using access control mechanisms, updating software, performing backups, disabling unused features, and protecting communications.

In addition, Forescout has advised owners of commercial installations to include security requirements in the procurement process, conduct risk assessments when setting up devices, ensure that they have visibility into the system, and add these devices to separate network segments, which are continuously monitored for signs of malicious activity. 

Related: Vulnerabilities Exposed Widely Used Solar Power Systems to Hacking, Disruption

Related: Siemens Patches Power Grid Product Flaw Allowing Backdoor Deployment

About The Author

Eduard Kovacs

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: AI Security Firm Straiker Emerges From Stealth With $21M in Funding
Next: T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit

Author's Other Posts

China Admitted to US That It Conducted Volt Typhoon Attacks: Report Treasury-Hacked-China.jpg

China Admitted to US That It Conducted Volt Typhoon Attacks: Report

April 11, 2025 0 0
GitHub Announces General Availability of Security Campaigns GitHub.jpeg

GitHub Announces General Availability of Security Campaigns

April 10, 2025 0 0
Nissan Leaf Hacked for Remote Spying, Physical Takeover Nissan-Leaf.png

Nissan Leaf Hacked for Remote Spying, Physical Takeover

April 10, 2025 0 0
Operations of Sensor Giant Sensata Disrupted by Ransomware Attack Ransomware-attacks.jpg

Operations of Sensor Giant Sensata Disrupted by Ransomware Attack

April 10, 2025 0 2

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 0

Trending Now

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg 5
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg 6
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks iran-hacking.jpg 7
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 2, 2025 0 0

You may have missed

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

Sean December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Sean December 4, 2025 0 0
whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
Copyright © 2026 All rights reserved. | MoreNews by AF themes.