First published: Wed Feb 26 2025(Updated: )
SunGrow WiNet-S V200.001.00.P025 and earlier versions is missing integrity checks for firmware upgrades. Sending a specific MQTT message allows an update to an inverter or a WiNet connectivity dongle with a bogus firmware file that is located on attacker-controlled server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SunGrow WiNet-S | <=V200.001.00.P025 | |
All of | ||
Sungrowpower Winet-s Firmware | <=200.001.00.P025 | |
Sungrowpower Winet-s Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50696 is classified as high severity due to its potential for allowing unauthorized firmware upgrades.
To mitigate the risks from CVE-2024-50696, ensure your firmware is updated to a version later than V200.001.00.P025 which addresses the vulnerability.
CVE-2024-50696 affects SunGrow WiNet-S versions V200.001.00.P025 and earlier.
CVE-2024-50696 enables attackers to exploit the lack of integrity checks for firmware upgrades, allowing for the installation of malicious firmware.
Yes, a patch has been released to address CVE-2024-50696; upgrading to the latest firmware version will resolve the vulnerability.