First published: Fri Jan 24 2025(Updated: )
SunGrow WiNet-SV200.001.00.P027 and earlier versions contains hardcoded MQTT credentials that allow an attacker to send arbitrary commands to an arbitrary inverter. It is also possible to impersonate the broker, because TLS is not used to identify the real MQTT broker. This means that MQTT communications are vulnerable to MitM attacks at the TCP/IP level.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SunGrow WiNet-SV200 | <=001.00.P027 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-50692 is considered critical due to the presence of hardcoded MQTT credentials and lack of TLS, which exposes devices to unauthorized command execution.
To fix CVE-2024-50692, update the SunGrow WiNet-SV200 to a version later than 001.00.P027 where the hardcoded credentials have been addressed.
The risks associated with CVE-2024-50692 include unauthorized access to inverter commands, potential for device impersonation, and unsecured MQTT communication.
CVE-2024-50692 affects users of SunGrow WiNet-SV200 versions 001.00.P027 and earlier, particularly in environments relying on MQTT for communication.
Yes, CVE-2024-50692 can lead to data breaches as attackers can exploit the vulnerability to send arbitrary commands, potentially compromising system integrity.