Researchers have uncovered critical security flaws in global solar power infrastructure that could potentially allow malicious actors to seize control of solar inverters and manipulate power generation at scale. Research indicates over half of solar inverter manufacturers (53%) and storage system providers (58%) originate from China, raising questions about supply chain security in critical infrastructure components. A recent investigation revealed 46 new vulnerabilities across three of the world’s top 10 solar inverter vendors, exposing systemic weaknesses in these increasingly essential components of modern power grids. Power utilities, device manufacturers, and regulators must collaborate to implement stronger security protocols and verification processes throughout the solar power supply chain. As solar power adoption accelerates globally, addressing these fundamental security weaknesses becomes increasingly critical to ensure grid stability and protect consumer privacy. Their analysis found that over the past three years, an average of 10 vulnerabilities in solar power systems have been disclosed annually, with 80% classified as high or critical severity. For Growatt inverters, researchers identified vulnerabilities enabling cloud-based takeover, granting unauthorized access to user resources and control of solar plants. Forescout researchers noted these security gaps are part of a troubling pattern in the solar power ecosystem. The vulnerabilities enable attackers to tamper with inverter settings through various attack vectors, including unauthorized access to cloud management platforms and exploitation of communication protocols. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. Even more concerning, 30% of these vulnerabilities received the highest possible CVSS scores (9.8-10), indicating attackers could gain complete control of affected systems. The exploitation chain continues with publishing malicious messages that trigger remote code execution, ultimately resulting in complete takeover of the inverter system and its operational parameters.
This Cyber News was published on cybersecuritynews.com. Publication date: Sat, 29 Mar 2025 08:35:09 +0000