9.8

CVE-2017-9859

An issue was discovered in SMA Solar Technology products. The inverters make use of a weak hashing algorithm to encrypt the password for REGISTER requests. This hashing algorithm can be cracked relatively easily. An attacker will likely be able to crack the password using offline crackers. This cracked password can then be used to register at the SMA servers. NOTE: the vendor's position is that "we consider the probability of the success of such manipulation to be extremely low." Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SmaSunny Boy 3600 Firmware Version-
   SmaSunny Boy 3600 Version-
SmaSunny Boy 5000 Firmware Version-
   SmaSunny Boy 5000 Version-
SmaSunny Tripower Core1 Firmware Version-
   SmaSunny Tripower Core1 Version-
SmaSunny Tripower 60 Firmware Version-
   SmaSunny Tripower 60 Version-
SmaSunny Boy 3000tl Firmware Version-
   SmaSunny Boy 3000tl Version-
SmaSunny Boy 3600tl Firmware Version-
   SmaSunny Boy 3600tl Version-
SmaSunny Boy 4000tl Firmware Version-
   SmaSunny Boy 4000tl Version-
SmaSunny Boy 5000tl Firmware Version-
   SmaSunny Boy 5000tl Version-
SmaSunny Boy 1.5 Firmware Version-
   SmaSunny Boy 1.5 Version-
SmaSunny Boy 2.5 Firmware Version-
   SmaSunny Boy 2.5 Version-
SmaSunny Boy 3.0 Firmware Version-
   SmaSunny Boy 3.0 Version-
SmaSunny Boy 3.6 Firmware Version-
   SmaSunny Boy 3.6 Version-
SmaSunny Boy 4.0 Firmware Version-
   SmaSunny Boy 4.0 Version-
SmaSunny Boy 5.0 Firmware Version-
   SmaSunny Boy 5.0 Version-
SmaSunny Central 2200 Firmware Version-
   SmaSunny Central 2200 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.17% 0.352
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:P/I:N/A:N
CWE-327 Use of a Broken or Risky Cryptographic Algorithm

The product uses a broken or risky cryptographic algorithm or protocol.