2017-08-05 19:29:00 2017-08-22 03:29:04

** DISPUTED ** An issue was discovered in SMA Solar Technology products. The SIP implementation does not properly use authentication with encryption: it is vulnerable to replay attacks, packet injection attacks, and man in the middle attacks. An attacker is able to successfully use SIP to communicate with the device from anywhere within the LAN. An attacker may use this to crash the device, stop it from communicating with the SMA servers, exploit known SIP vulnerabilities, or find sensitive information from the SIP communications. Furthermore, because the SIP communication channel is unencrypted, an attacker capable of understanding the protocol can eavesdrop on communications. For example, passwords can be extracted. NOTE: the vendor's position is that authentication with encryption is not required on an isolated subnetwork. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected.

Vector

NETWORK

Complexity

LOW

Authentication

NONE

Confidentiality

PARTIAL

Integrity

PARTIAL

Availability

COMPLETE
Sma Sunny boy 4.0 firmware - (not an official CPE) Sma Sunny tripower core1 firmware - (not an official CPE) Sma Sunny central storage 900 firmware - (not an official CPE) Sma Sunny tripower 25000tl firmware - (not an official CPE) Sma Sunny central storage 850 firmware - (not an official CPE) Sma Sunny central 800cp xt firmware - (not an official CPE) Sma Sunny tripower 12000tl firmware - (not an official CPE) Sma Sunny central storage 800 firmware - (not an official CPE) Sma Sunny boy 4000tl firmware - (not an official CPE) Sma Sunny central storage 760 firmware - (not an official CPE) Sma Sunny central storage 500 firmware - (not an official CPE) Sma Sunny boy 3000tl firmware - (not an official CPE) Sma Sunny boy 1.5 firmware - (not an official CPE) Sma Sunny boy storage 2.5 firmware - (not an official CPE) Sma Sunny central storage 630 firmware - (not an official CPE) Sma Sunny boy 3.0 firmware - (not an official CPE) Sma Sunny boy 5.0 firmware - (not an official CPE) Sma Sunny central 900cp xt firmware - (not an official CPE) Sma Sunny boy 5000tl firmware - (not an official CPE) Sma Sunny central storage 2500-ev firmware - (not an official CPE) Sma Sunny central 500cp xt firmware - (not an official CPE) Sma Sunny boy 2.5 firmware - (not an official CPE) Sma Sunny central 2200 firmware - (not an official CPE) Sma Sunny boy 3600tl firmware - (not an official CPE) Sma Sunny central 630cp xt firmware - (not an official CPE) Sma Sunny boy 3600 firmware - (not an official CPE) Sma Sunny boy 3.6 firmware - (not an official CPE) Sma Sunny central 1000cp xt firmware - (not an official CPE) Sma Sunny central storage 1000 firmware - (not an official CPE) Sma Sunny boy 5000 firmware - (not an official CPE) Sma Sunny central storage 720 firmware - (not an official CPE) Sma Sunny central 850cp xt firmware - (not an official CPE) Sma Sunny central 720cp xt firmware - (not an official CPE) Sma Sunny central 760cp xt firmware - (not an official CPE) Sma Sunny tripower 5000tl firmware - (not an official CPE) Sma Sunny tripower 15000tl firmware - (not an official CPE) Sma Sunny tripower 60 firmware - (not an official CPE) Sma Sunny central storage 2200 firmware - (not an official CPE) Sma Sunny tripower 20000tl firmware - (not an official CPE)

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (ID 74)

Related CAPEC 38 Buffer Overflow via Environment Variables (CAPEC-ID 10) Server Side Include (SSI) Injection (CAPEC-ID 101) Cross Site Scripting through Log Files (CAPEC-ID 106) Command Line Execution through SQL Injection (CAPEC-ID 108) Subverting Environment Variable Values (CAPEC-ID 13) Format String Injection (CAPEC-ID 135) Client-side Injection-induced Buffer Overflow (CAPEC-ID 14) Filter Failure through Buffer Overflow (CAPEC-ID 24) XML Injection (CAPEC-ID 250) Leverage Alternate Encoding (CAPEC-ID 267) HTTP Response Smuggling (CAPEC-ID 273) Fuzzing (CAPEC-ID 28) Using Leading 'Ghost' Character Sequences to Bypass Input Filters (CAPEC-ID 3) HTTP Response Splitting (CAPEC-ID 34) Manipulating Writeable Terminal Devices (CAPEC-ID 40) MIME Conversion (CAPEC-ID 42) Exploiting Multiple Input Interpretation Layers (CAPEC-ID 43) Buffer Overflow via Symbolic Links (CAPEC-ID 45) Overflow Variables and Tags (CAPEC-ID 46) Buffer Overflow via Parameter Expansion (CAPEC-ID 47) Poison Web Service Registry (CAPEC-ID 51) Embedding NULL Bytes (CAPEC-ID 52) Postfix, Null Terminate, and Backslash (CAPEC-ID 53) Using Slashes and URL Encoding Combined to Bypass Validation Logic (CAPEC-ID 64) SQL Injection (CAPEC-ID 66) String Format Overflow in syslog() (CAPEC-ID 67) Blind SQL Injection (CAPEC-ID 7) Using Unicode Encoding to Bypass Validation Logic (CAPEC-ID 71) URL Encoding (CAPEC-ID 72) Manipulating Input to File System Calls (CAPEC-ID 76) Using Escaped Slashes in Alternate Encoding (CAPEC-ID 78) Using Slashes in Alternate Encoding (CAPEC-ID 79) Buffer Overflow in an API Call (CAPEC-ID 8) Using UTF-8 Encoding to Bypass Validation Logic (CAPEC-ID 80) XPath Injection (CAPEC-ID 83) XQuery Injection (CAPEC-ID 84) Buffer Overflow in Local Command-Line Utilities (CAPEC-ID 9) XSS in IMG Tags (CAPEC-ID 91)