Vulnerability Description
An issue was discovered on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an unauthenticated user at /info.xml.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Enphase | Envoy Firmware | d4.0 |
| Enphase | Envoy | - |
References
- https://enphase.com/en-us/products-and-services/envoy-and-combinerProductVendor Advisory
- https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-faExploitThird Party Advisory
- https://stage2sec.comThird Party Advisory
- https://enphase.com/en-us/products-and-services/envoy-and-combinerProductVendor Advisory
- https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-faExploitThird Party Advisory
- https://stage2sec.comThird Party Advisory
FAQ
What is CVE-2020-25753?
CVE-2020-25753 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an u...
How severe is CVE-2020-25753?
CVE-2020-25753 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-25753?
Check the references section above for vendor advisories and patch information. Affected products include: Enphase Envoy Firmware, Enphase Envoy.