Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Power

Actively Exploited Vulnerability Threatens Hundreds of Solar Power Stations (arstechnica.com) 23

An anonymous reader quotes a report from Ars Technica: Hundreds of Internet-exposed devices inside solar farms remain unpatched against a critical and actively exploited vulnerability that makes it easy for remote attackers to disrupt operations or gain a foothold inside the facilities. The devices, sold by Osaka, Japan-based Contec under the brand name SolarView, help people inside solar facilities monitor the amount of power they generate, store, and distribute. Contec says that roughly 30,000 power stations have introduced the devices, which come in various packages based on the size of the operation and the type of equipment it uses.

Searches on Shodan indicate that more than 600 of them are reachable on the open Internet. As problematic as that configuration is, researchers from security firm VulnCheck said Wednesday, more than two-thirds of them have yet to install an update that patches CVE-2022-29303, the tracking designation for a vulnerability with a severity rating of 9.8 out of 10. The flaw stems from the failure to neutralize potentially malicious elements included in user-supplied input, leading to remote attacks that execute malicious commands. Security firm Palo Alto Networks said last month the flaw was under active exploit by an operator of Mirai, an open source botnet consisting of routers and other so-called Internet of Things devices. The compromise of these devices could cause facilities that use them to lose visibility into their operations, which could result in serious consequences depending on where the vulnerable devices are used.

"The fact that a number of these systems are Internet facing and that the public exploits have been available long enough to get rolled into a Mirai-variant is not a good situation," VulnCheck researcher Jacob Baines wrote. "As always, organizations should be mindful of which systems appear in their public IP space and track public exploits for systems that they rely on." Baines said that the same devices vulnerable to CVE-2022-29303 were also vulnerable to CVE-2023-23333, a newer command-injection vulnerability that also has a severity rating of 9.8. Although there are no known reports of it being actively exploited, exploit code has been publicly available since February. Incorrect descriptions for both vulnerabilities are one factor involved in the patch failures, Baines said. Both vulnerabilities indicate that SolarView versions 8.00 and 8.10 are patched against CVE-2022-29303 and CVE-2023-293333. In fact, the researcher said, only 8.10 is patched against the threats.

This discussion has been archived. No new comments can be posted.

Actively Exploited Vulnerability Threatens Hundreds of Solar Power Stations

Comments Filter:
  • by Anonymous Coward on Wednesday July 05, 2023 @11:33PM (#63660756)

    Without liability in the form of automatic penalties and fines,
    there will be no improvement in IoT software security.

  • by takionya ( 7833802 ) on Wednesday July 05, 2023 @11:43PM (#63660774)
    What kind of idiots are still doing this in mid 2023?
    Yet another defect in the web interface.
    • by Jahta ( 1141213 ) on Thursday July 06, 2023 @06:11AM (#63661254)

      What kind of idiots are still doing this in mid 2023? Yet another defect in the web interface.

      Yeah, this is Security 101 stuff; "you can't hack something that isn't there". But too many organisations see security spend as dead money. The attitude is, why go to the expense of setting up a private network (and a secure VPN if your people need remote access) when you can just put everything on the public Internet?

    • by tlhIngan ( 30335 )

      What kind of idiots are still doing this in mid 2023?
      Yet another defect in the web interface.

      Lots, actually. Any solar installation, including residental solar, is full of analytics. Basically every solar inverter has a Wi-Fi or Ethernet connection to connect it to the Internet for analytics and management purposes (many places do not allow "dumb" inverters to be installed and require "smart" inverters).

      There are also many sites that publish the solar analytics data so users can view and compare how their s

    • by gweihir ( 88907 )

      The usual idiots. Most people are incapable of learning. There is absolutely no excuse anymore for crap like that. Bus since there is no liability, the ones responsible do not get fired. And hence nothing changes.

    • by PPH ( 736903 )

      What kind of idiots

      The kind with CEOs that insist on whipping out their iPhones and showing their golf buddies exactly how many kilowatts their solar plant is putting out right now.

      The kind of idiot that you don't argue with. You just open the port to the world, shake your head and walk away.

  • by Tablizer ( 95088 ) on Wednesday July 05, 2023 @11:56PM (#63660790) Journal

    Republicans: "Nobody ever hacked coal"

  • Hundreds of Internet-exposed devices inside solar farms

    The big danger here is that from everything I know about hackers from the movies, this means they might be able to hack through the panels into the sun itself and then we are screwed!

  • The security of solar power stations is crucial for a resilient and sustainable energy future. This concerning news reminds us of the need for robust cybersecurity measures to safeguard critical infrastructure. Let's address these vulnerabilities swiftly and collaboratively to protect our renewable energy systems and ensure a secure energy landscape.

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (10) Sorry, but that's too useful.

Working...