Sma

Sunny Central 800cp Xt Firmware

12 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.33%
  • Veröffentlicht 05.08.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An Incorrect Password Management issue was discovered in SMA Solar Technology products. Default passwords exist that are rarely changed. User passwords will almost always be default. Installer passwords are expected to be default or similar across in...

  • EPSS 0.33%
  • Veröffentlicht 05.08.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in SMA Solar Technology products. All inverters have a very weak password policy for the user and installer password. No complexity requirements or length requirements are set. Also, strong passwords are impossible due to a ma...

  • EPSS 0.2%
  • Veröffentlicht 05.08.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in SMA Solar Technology products. By sniffing for specific packets on the localhost, plaintext passwords can be obtained as they are typed into Sunny Explorer by the user. These passwords can then be used to compromise the ove...

  • EPSS 0.42%
  • Veröffentlicht 05.08.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in SMA Solar Technology products. A secondary authentication system is available for Installers called the Grid Guard system. This system uses predictable codes, and a single Grid Guard code can be used on any SMA inverter. An...

  • EPSS 0.18%
  • Veröffentlicht 05.08.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in SMA Solar Technology products. Sniffed passwords from SMAdata2+ communication can be decrypted very easily. The passwords are "encrypted" using a very simple encryption algorithm. This enables an attacker to find the plaint...

  • EPSS 0.12%
  • Veröffentlicht 05.08.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in SMA Solar Technology products. The SMAdata2+ communication protocol does not properly use authentication with encryption: it is vulnerable to man in the middle, packet injection, and replay attacks. Any setting change, auth...

  • EPSS 0.77%
  • Veröffentlicht 05.08.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in SMA Solar Technology products. By sending crafted packets to an inverter and observing the response, active and inactive user accounts can be determined. This aids in further attacks (such as a brute force attack) as one no...

  • EPSS 0.17%
  • Veröffentlicht 05.08.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in SMA Solar Technology products. The inverters make use of a weak hashing algorithm to encrypt the password for REGISTER requests. This hashing algorithm can be cracked relatively easily. An attacker will likely be able to cr...

  • EPSS 0.44%
  • Veröffentlicht 05.08.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in SMA Solar Technology products. An attacker can use Sunny Explorer or the SMAdata2+ network protocol to update the device firmware without ever having to authenticate. If an attacker is able to create a custom firmware versi...

  • EPSS 0.16%
  • Veröffentlicht 05.08.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in SMA Solar Technology products. The SIP implementation does not properly use authentication with encryption: it is vulnerable to replay attacks, packet injection attacks, and man in the middle attacks. An attacker is able to...