46 New Vulnerabilities in Solar Inverters Systems Let Attackers Tamper Inverter Settings

Researchers have uncovered critical security flaws in global solar power infrastructure that could potentially allow malicious actors to seize control of solar inverters and manipulate power generation at scale. A recent investigation revealed 46 new vulnerabilities across three of the world’s top 10 solar inverter vendors, exposing systemic weaknesses in these increasingly essential components of […] The post 46 New Vulnerabilities in Solar Inverters Systems Let Attackers Tamper Inverter Settings appeared first on Cyber Security News.

Mar 29, 2025 - 10:41
 0
46 New Vulnerabilities in Solar Inverters Systems Let Attackers Tamper Inverter Settings

Researchers have uncovered critical security flaws in global solar power infrastructure that could potentially allow malicious actors to seize control of solar inverters and manipulate power generation at scale.

A recent investigation revealed 46 new vulnerabilities across three of the world’s top 10 solar inverter vendors, exposing systemic weaknesses in these increasingly essential components of modern power grids.

The vulnerabilities enable attackers to tamper with inverter settings through various attack vectors, including unauthorized access to cloud management platforms and exploitation of communication protocols.

If successfully leveraged, these flaws could allow adversaries to trigger coordinated load-changing attacks, potentially destabilizing power grids and leading to emergency measures or even blackouts.

Forescout researchers noted these security gaps are part of a troubling pattern in the solar power ecosystem.

Their analysis found that over the past three years, an average of 10 vulnerabilities in solar power systems have been disclosed annually, with 80% classified as high or critical severity.

Even more concerning, 30% of these vulnerabilities received the highest possible CVSS scores (9.8-10), indicating attackers could gain complete control of affected systems.

The attack vectors vary by manufacturer. For Growatt inverters, researchers identified vulnerabilities enabling cloud-based takeover, granting unauthorized access to user resources and control of solar plants.

The following code snippet illustrates a simplified version of how authentication bypass might occur:-

# Vulnerable authentication check in Growatt systems
def verify_user_access(user_id, resource_id):
    # Missing proper authorization checks
    # No validation if user_id has permission for resource_id
    return True  # Always grants access regardless of permissions

Sungrow inverters demonstrated a different vulnerability pattern, susceptible to hijacking through communication dongle serial number harvesting.

Attackers could exploit insecure direct object references (IDORs) paired with hard-coded credentials discovered on the devices.

The exploitation chain continues with publishing malicious messages that trigger remote code execution, ultimately resulting in complete takeover of the inverter system and its operational parameters.

The geopolitical dimension adds another layer of concern to these findings.

Research indicates over half of solar inverter manufacturers (53%) and storage system providers (58%) originate from China, raising questions about supply chain security in critical infrastructure components.

Following responsible disclosure protocols, all identified vulnerabilities have been patched by the affected vendors.

The discovery of these 46 vulnerabilities represents a significant security challenge for the renewable energy sector.

As solar power adoption accelerates globally, addressing these fundamental security weaknesses becomes increasingly critical to ensure grid stability and protect consumer privacy.

Power utilities, device manufacturers, and regulators must collaborate to implement stronger security protocols and verification processes throughout the solar power supply chain.

The post 46 New Vulnerabilities in Solar Inverters Systems Let Attackers Tamper Inverter Settings appeared first on Cyber Security News.