Vulnerability Description
An issue was discovered in SMA Solar Technology products. The SMAdata2+ communication protocol does not properly use authentication with encryption: it is vulnerable to man in the middle, packet injection, and replay attacks. Any setting change, authentication packet, scouting packet, etc. can be replayed, injected, or used for a man in the middle session. All functionalities available in Sunny Explorer can effectively be done from anywhere within the network as long as an attacker gets the packet setup correctly. This includes the authentication process for all (including hidden) access levels and the changing of settings in accordance with the gained access rights. Furthermore, because the SMAdata2+ communication channel is unencrypted, an attacker capable of understanding the protocol can eavesdrop on communications. NOTE: the vendor's position is that authentication with encryption is not required on an isolated subnetwork. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sma | Sunny Boy 3600 Firmware | - |
| Sma | Sunny Boy 3600 | - |
| Sma | Sunny Boy 5000 Firmware | - |
| Sma | Sunny Boy 5000 | - |
| Sma | Sunny Tripower Core1 Firmware | - |
| Sma | Sunny Tripower Core1 | - |
| Sma | Sunny Tripower 15000Tl Firmware | - |
| Sma | Sunny Tripower 15000Tl | - |
| Sma | Sunny Tripower 20000Tl Firmware | - |
| Sma | Sunny Tripower 20000Tl | - |
| Sma | Sunny Tripower 25000Tl Firmware | - |
| Sma | Sunny Tripower 25000Tl | - |
| Sma | Sunny Tripower 5000Tl Firmware | - |
| Sma | Sunny Tripower 5000Tl | - |
| Sma | Sunny Tripower 12000Tl Firmware | - |
| Sma | Sunny Tripower 12000Tl | - |
| Sma | Sunny Tripower 60 Firmware | - |
| Sma | Sunny Tripower 60 | - |
| Sma | Sunny Boy 3000Tl Firmware | - |
| Sma | Sunny Boy 3000Tl | - |
Related Weaknesses (CWE)
References
- http://www.sma.de/en/statement-on-cyber-security.html
- http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whi
- https://horusscenario.com/CVE-information/Third Party Advisory
- http://www.sma.de/en/statement-on-cyber-security.html
- http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whi
- https://horusscenario.com/CVE-information/Third Party Advisory
FAQ
What is CVE-2017-9857?
CVE-2017-9857 is a vulnerability with a CVSS score of 8.1 (HIGH). An issue was discovered in SMA Solar Technology products. The SMAdata2+ communication protocol does not properly use authentication with encryption: it is vulnerable to man in the middle, packet injec...
How severe is CVE-2017-9857?
CVE-2017-9857 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-9857?
Check the references section above for vendor advisories and patch information. Affected products include: Sma Sunny Boy 3600 Firmware, Sma Sunny Boy 3600, Sma Sunny Boy 5000 Firmware, Sma Sunny Boy 5000, Sma Sunny Tripower Core1 Firmware.