Skip to content
Breach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot

Researchers Identify Security Vulnerabilities in Solarman and Deye Solar Systems

  • adminadmin
  • October 10, 2024
  • vulnerabilities

Cybersecurity Vulnerabilities Discovered in Solarman and Deye Solar Management Platforms

Recent investigations by cybersecurity experts have unveiled serious security flaws within the photovoltaic system management platforms operated by the Chinese firms Solarman and Deye. These vulnerabilities pose significant risks, potentially allowing malicious actors to disrupt operations and cause widespread power outages.

Researchers from Bitdefender, a Romanian cybersecurity company, have detailed their findings, indicating that if exploited, these vulnerabilities could grant attackers control over inverter settings integral to solar grid operations. This control could lead to cascading failures across portions of the electrical grid, raising the specter of blackouts. As reported, the vulnerabilities were disclosed responsibly by researchers to the companies in May 2024, and they have since been addressed as of July 2024.

The analysis highlighted multiple weaknesses in the two platforms, which could facilitate unauthorized account access and expose sensitive information. Among these issues, a notable concern is the potential for full account takeover through manipulation of authorization tokens via specific API endpoints. Additionally, vulnerabilities enabling the reuse of tokens and unintentional information disclosure were identified.

The report specifies several critical security risks, including the existence of hard-coded accounts allowing unrestricted device access and potential weaknesses in JWT management, which could empower attackers to generate unauthorized tokens. Such issues indicate a significant lapse in security protocols that are essential for safeguarding sensitive energy management systems.

If successfully exploited, these vulnerabilities could lead attackers to not only gain control over Solarman accounts but also to utilize Deye Cloud tokens to access these accounts unlawfully. This access could lead to the extraction of private data on registered organizations and insight into Deye devices.

Cybersecurity experts caution that attackers gaining such access can initiate disruption in solar power generation, with implications for grid stability. The potential for leakage of sensitive user information could also facilitate targeted phishing attacks and other malign activities. The researchers further emphasized the potential for attackers to modify inverter settings, resulting in serious disruptions to power distribution and threats to grid integrity.

According to the MITRE ATT&CK framework, the tactics relevant to this incident include initial access, where attackers might gain access through vulnerable APIs or misuse of tokens, and privilege escalation, allowing them to assume control over critical system settings. Persistent threats could arise from attackers leveraging these initial compromises to maintain control over compromised accounts and systems.

In summary, the recent findings underscore the pressing need for enhanced cybersecurity measures within solar energy management systems. As the reliance on renewable energy sources increases, ensuring robust security protocols will become even more crucial to protect infrastructure from evolving cyber threats.

For business owners managing energy systems, keeping abreast of such developments is essential to safeguard operations and mitigate potential losses related to cybersecurity incidents.

Source link

Help Prevent Exploitation, Report Breaches

Help to prevent further data unauthorized access or potential exploitation. Protect others by sharing vital breach information. If you’ve discovered a new data breach

REPORT HERE
Trending now

"Fortinet" AI Android Apple artificial intelligence Artificial Intelligence & Machine Learning AT&T AWS CISA Cisco Cloudflare cloud security compliance CrowdStrike cryptocurrency Cybercrime cybersecurity data breach data breaches data privacy data security encryption ESET Facebook FBI Fraud Management GitHub Google healthcare HIPAA Kaspersky machine learning Malware Mandiant Meta Microsoft Multi-Factor Authentication OpenAI Palo Alto Networks phishing ransomware Salesforce Telegram Trend Micro Windows

Sector alert bulletin

Subscribe to your sector-specific insight newsletter to stay updated on potential data breaches and ongoing cyber-attacks targeting your industry

Stay informed and prepared against emerging security threats.

SUSCRIBE NOW

Related Posts

China Enacts New Law Mandating Vendors to Report Zero-Day Vulnerabilities to Authorities

On July 17, 2021, the Cyberspace Administration of China (CAC) introduced stricter regulations regarding vulnerability disclosure. Under the new “Regulations on the Management of Network Product Security Vulnerability,” software and networking vendors are required to report critical flaws directly to government authorities within two days of identification. Set to take effect on September 1, 2021, these regulations aim to standardize the processes of discovering, reporting, and addressing security vulnerabilities while mitigating associated risks. Article 4 of the regulation prohibits any organization or individual from exploiting network security vulnerabilities for malicious activities and bans the illegal sale, collection, or publication of such information. The new rules also prevent the public disclosure of previously unknown security weaknesses.

  • April 16, 2026

Researcher Reveals Yet Another Unpatched Vulnerability in Windows Printer Spooler

Date: July 19, 2021

Just days after Microsoft raised alarms about an unpatched security flaw in the Windows Print Spooler service, yet another potential zero-day vulnerability has surfaced, marking the fourth printer-related issue identified in recent weeks. Will Dormann from the CERT Coordination Center noted in an advisory on Sunday that “Microsoft Windows allows non-admin users to install printer drivers through Point and Print.” He highlighted that printers installed this way can load arbitrary libraries by the privileged Windows Print Spooler process. Security researcher Benjamin Delpy, known for creating Mimikatz, has disclosed an exploit for this vulnerability. #printnightmare – Episode 4

  • April 16, 2026

Millions of HP, Samsung, and Xerox Printers Vulnerable Due to 16-Year-Old Security Flaw

July 20, 2021

A serious security vulnerability has come to light in a software driver used by HP, Xerox, and Samsung printers, lingering undetected since 2005. Assigned CVE-2021-3438 (CVSS score: 8.8), this issue involves a buffer overflow in the “SSPORT.SYS” print driver installer, which could allow for remote privilege escalation and arbitrary code execution. Hundreds of millions of printers worldwide may be affected, although there is currently no evidence of real-world exploitation. The vulnerability, first identified by SentinelLabs researchers on February 18, 2021, was disclosed in an advisory in May, noting its potential to elevate privileges in certain HP LaserJet and Samsung printer models. Fixes for the impacted devices were made available on May 19, 2021.

  • April 16, 2026

New Vulnerabilities in Windows and Linux Grant Attackers Elevated System Privileges

July 21, 2021

Recent findings have uncovered a local privilege escalation vulnerability in Microsoft’s Windows 10 and the soon-to-be-released Windows 11, enabling users with limited permissions to access critical system files. This loophole, referred to as “SeriousSAM,” allows unauthorized individuals to potentially reveal the operating system installation password and decrypt private keys.

According to a vulnerability note from the CERT Coordination Center (CERT/CC), since Windows 10 build 1809, non-administrative users have had access to the SAM, SYSTEM, and SECURITY registry hive files, which could lead to local privilege escalation (LPE). The affected operating system configuration files include:

  • c:\Windows\System32\config\sam
  • c:\Windows\System32\config\system
  • c:\Windows\System32\config\security

Microsoft, which has assigned the identifier CVE-2021-36934 to this vulnerability, has acknowledged the issue but has not yet released a patch.

  • April 16, 2026

Real-time data breach monitoring by scanning public databases, criminal forums, and online markets to detect exposed credentials and sensitive data.

Industries
  • Enterprise Security Teams
  • Financial Services
  • Retail and E-commerce
  • Legal Services
  • Law Enforcement
Commonly Used For
  • Penetration Testing
  • M&A Risk Research
  • Vulnerability Assessment
  • Red Team Operation
  • Enterprise Security
Contact Us

Need help or have a question?

Email: info@breachspot.com
Phone: +1 (914) 2943243

Copyright © 2026 - Breachspot, Security Breaches Spotted