Description
An issue was discovered in SMA Solar Technology products. Sniffed passwords from SMAdata2+ communication can be decrypted very easily. The passwords are "encrypted" using a very simple encryption algorithm. This enables an attacker to find the plaintext passwords and authenticate to the device. NOTE: the vendor reports that only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected
Scores
CVSS v3
3.4
EPSS
0.0018
EPSS Percentile
38.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-256
Status
published
Products (39)
sma/sunny_boy_1.5_firmware
sma/sunny_boy_2.5_firmware
sma/sunny_boy_3.0_firmware
sma/sunny_boy_3.6_firmware
sma/sunny_boy_3000tl_firmware
sma/sunny_boy_3600_firmware
sma/sunny_boy_3600tl_firmware
sma/sunny_boy_4.0_firmware
sma/sunny_boy_4000tl_firmware
sma/sunny_boy_5.0_firmware
... and 29 more
Published
Aug 05, 2017
Tracked Since
Feb 18, 2026