CVE-2024-50692

SunGrow WiNet-SV200.001.00.P027 and earlier versions contains hardcoded MQTT credentials that allow an attacker to send arbitrary commands to an arbitrary inverter. It is also possible to impersonate the broker, because TLS is not used to identify the real MQTT broker. This means that MQTT communications are vulnerable to MitM attacks at the TCP/IP level.
Configurations

No configuration.

History

06 Feb 2025, 17:15

Type Values Removed Values Added
Summary
  • (es) SunGrow WiNet-SV200.001.00.P027 y versiones anteriores contienen credenciales MQTT codificadas que permiten a un atacante enviar comandos arbitrarios a un inversor arbitrario. También es posible hacerse pasar por el bróker, ya que no se utiliza TLS para identificar al bróker MQTT real. Esto significa que las comunicaciones MQTT son vulnerables a ataques MitM a nivel TCP/IP.
References
  • () https://mqtt-pwn.readthedocs.io/en/latest/intro.html -
CWE CWE-798
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4

24 Jan 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-24 23:15

Updated : 2025-02-06 17:15


NVD link : CVE-2024-50692

Mitre link : CVE-2024-50692

CVE.ORG link : CVE-2024-50692


JSON object : View

Products Affected

No product.

CWE
CWE-798

Use of Hard-coded Credentials