Unknown
CVE-2017-9857
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
An issue was discovered in SMA Solar Technology products. The SMAdata2+ communication protocol does not properly use authentication with encryption: it is vulnerable to man in the middle, packet injection, and replay attacks. Any setting change, authentication packet, scouting packet, etc. can be replayed, injected, or used for a man in the middle session. All functionalities available in Sunny Explorer can effectively be done from anywhere within the network as long as an attacker gets the packet setup correctly. This includes the authentication process for all (including hidden) access levels and the changing of settings in accordance with the gained access rights. Furthermore, because the SMAdata2+ communication channel is unencrypted, an attacker capable of understanding the protocol can eavesdrop on communications. NOTE: the vendor’s position is that authentication with encryption is not required on an isolated subnetwork. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- sunny boy 1.5 firmware -,
- sunny boy 2.5 firmware -,
- sunny boy 3.0 firmware -,
- sunny boy 3.6 firmware -,
- sunny boy 3000tl firmware -,
- sunny boy 3600 firmware -,
- sunny boy 3600tl firmware -,
- sunny boy 4.0 firmware -,
- sunny boy 4000tl firmware -,
- sunny boy 5.0 firmware -,
- sunny boy 5000 firmware -,
- sunny boy 5000tl firmware -,
- sunny boy storage 2.5 firmware -,
- sunny central 1000cp xt firmware -,
- sunny central 2200 firmware -,
- sunny central 500cp xt firmware -,
- sunny central 630cp xt firmware -,
- sunny central 720cp xt firmware -,
- sunny central 760cp xt firmware -,
- sunny central 800cp xt firmware -,
- sunny central 850cp xt firmware -,
- sunny central 900cp xt firmware -,
- sunny central storage 1000 firmware -,
- sunny central storage 2200 firmware -,
- sunny central storage 2500-ev firmware -,
- sunny central storage 500 firmware -,
- sunny central storage 630 firmware -,
- sunny central storage 720 firmware -,
- sunny central storage 760 firmware -,
- sunny central storage 800 firmware -,
- sunny central storage 850 firmware -,
- sunny central storage 900 firmware -,
- sunny tripower 12000tl firmware -,
- sunny tripower 15000tl firmware -,
- sunny tripower 20000tl firmware -,
- sunny tripower 25000tl firmware -,
- sunny tripower 5000tl firmware -,
- sunny tripower 60 firmware -,
- sunny tripower core1 firmware -
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: