9.8

CVE-2017-9861

An issue was discovered in SMA Solar Technology products. The SIP implementation does not properly use authentication with encryption: it is vulnerable to replay attacks, packet injection attacks, and man in the middle attacks. An attacker is able to successfully use SIP to communicate with the device from anywhere within the LAN. An attacker may use this to crash the device, stop it from communicating with the SMA servers, exploit known SIP vulnerabilities, or find sensitive information from the SIP communications. Furthermore, because the SIP communication channel is unencrypted, an attacker capable of understanding the protocol can eavesdrop on communications. For example, passwords can be extracted. NOTE: the vendor's position is that authentication with encryption is not required on an isolated subnetwork. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SmaSunny Boy 3600 Firmware Version-
   SmaSunny Boy 3600 Version-
SmaSunny Boy 5000 Firmware Version-
   SmaSunny Boy 5000 Version-
SmaSunny Tripower Core1 Firmware Version-
   SmaSunny Tripower Core1 Version-
SmaSunny Tripower 60 Firmware Version-
   SmaSunny Tripower 60 Version-
SmaSunny Boy 3000tl Firmware Version-
   SmaSunny Boy 3000tl Version-
SmaSunny Boy 3600tl Firmware Version-
   SmaSunny Boy 3600tl Version-
SmaSunny Boy 4000tl Firmware Version-
   SmaSunny Boy 4000tl Version-
SmaSunny Boy 5000tl Firmware Version-
   SmaSunny Boy 5000tl Version-
SmaSunny Boy 1.5 Firmware Version-
   SmaSunny Boy 1.5 Version-
SmaSunny Boy 2.5 Firmware Version-
   SmaSunny Boy 2.5 Version-
SmaSunny Boy 3.0 Firmware Version-
   SmaSunny Boy 3.0 Version-
SmaSunny Boy 3.6 Firmware Version-
   SmaSunny Boy 3.6 Version-
SmaSunny Boy 4.0 Firmware Version-
   SmaSunny Boy 4.0 Version-
SmaSunny Boy 5.0 Firmware Version-
   SmaSunny Boy 5.0 Version-
SmaSunny Central 2200 Firmware Version-
   SmaSunny Central 2200 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.16% 0.333
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 9 10 8.5
AV:N/AC:L/Au:N/C:P/I:P/A:C
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.