Description
An issue was discovered in SMA Solar Technology products. By sniffing for specific packets on the localhost, plaintext passwords can be obtained as they are typed into Sunny Explorer by the user. These passwords can then be used to compromise the overall device. NOTE: the vendor reports that exploitation likelihood is low because these packets are usually sent only once during installation. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected
References (3)
Core 3
Core References
Various Sources x_refsource_misc
http://www.sma.de/en/statement-on-cyber-security.html
Third Party Advisory x_refsource_misc
https://horusscenario.com/CVE-information/
Various Sources x_refsource_misc
http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whitepaper-Cyber-Security-AEN1732_07.pdf
Scores
CVSS v3
9.8
EPSS
0.0020
EPSS Percentile
41.9%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-311
Status
published
Products (39)
sma/sunny_boy_1.5_firmware
sma/sunny_boy_2.5_firmware
sma/sunny_boy_3.0_firmware
sma/sunny_boy_3.6_firmware
sma/sunny_boy_3000tl_firmware
sma/sunny_boy_3600_firmware
sma/sunny_boy_3600tl_firmware
sma/sunny_boy_4.0_firmware
sma/sunny_boy_4000tl_firmware
sma/sunny_boy_5.0_firmware
... and 29 more
Published
Aug 05, 2017
Tracked Since
Feb 18, 2026