cpe:/o:sma:sunny_boy_1.5_firmware:- cpe:/o:sma:sunny_boy_2.5_firmware:- cpe:/o:sma:sunny_boy_3.0_firmware:- cpe:/o:sma:sunny_boy_3.6_firmware:- cpe:/o:sma:sunny_boy_3000tl_firmware:- cpe:/o:sma:sunny_boy_3600_firmware:- cpe:/o:sma:sunny_boy_3600tl_firmware:- cpe:/o:sma:sunny_boy_4.0_firmware:- cpe:/o:sma:sunny_boy_4000tl_firmware:- cpe:/o:sma:sunny_boy_5.0_firmware:- cpe:/o:sma:sunny_boy_5000_firmware:- cpe:/o:sma:sunny_boy_5000tl_firmware:- cpe:/o:sma:sunny_boy_storage_2.5_firmware:- cpe:/o:sma:sunny_central_1000cp_xt_firmware:- cpe:/o:sma:sunny_central_2200_firmware:- cpe:/o:sma:sunny_central_500cp_xt_firmware:- cpe:/o:sma:sunny_central_630cp_xt_firmware:- cpe:/o:sma:sunny_central_720cp_xt_firmware:- cpe:/o:sma:sunny_central_760cp_xt_firmware:- cpe:/o:sma:sunny_central_800cp_xt_firmware:- cpe:/o:sma:sunny_central_850cp_xt_firmware:- cpe:/o:sma:sunny_central_900cp_xt_firmware:- cpe:/o:sma:sunny_central_storage_1000_firmware:- cpe:/o:sma:sunny_central_storage_2200_firmware:- cpe:/o:sma:sunny_central_storage_2500-ev_firmware:- cpe:/o:sma:sunny_central_storage_500_firmware:- cpe:/o:sma:sunny_central_storage_630_firmware:- cpe:/o:sma:sunny_central_storage_720_firmware:- cpe:/o:sma:sunny_central_storage_760_firmware:- cpe:/o:sma:sunny_central_storage_800_firmware:- cpe:/o:sma:sunny_central_storage_850_firmware:- cpe:/o:sma:sunny_central_storage_900_firmware:- cpe:/o:sma:sunny_tripower_12000tl_firmware:- cpe:/o:sma:sunny_tripower_15000tl_firmware:- cpe:/o:sma:sunny_tripower_20000tl_firmware:- cpe:/o:sma:sunny_tripower_25000tl_firmware:- cpe:/o:sma:sunny_tripower_5000tl_firmware:- cpe:/o:sma:sunny_tripower_60_firmware:- cpe:/o:sma:sunny_tripower_core1_firmware:- CVE-2017-9859 2017-08-05T13:29:00.677-04:00 2019-10-02T20:03:26.223-04:00 5.0 NETWORK LOW NONE PARTIAL NONE NONE http://nvd.nist.gov MISC http://www.sma.de/en/statement-on-cyber-security.html MISC http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whitepaper-Cyber-Security-AEN1732_07.pdf MISC https://horusscenario.com/CVE-information/ ** DISPUTED ** An issue was discovered in SMA Solar Technology products. The inverters make use of a weak hashing algorithm to encrypt the password for REGISTER requests. This hashing algorithm can be cracked relatively easily. An attacker will likely be able to crack the password using offline crackers. This cracked password can then be used to register at the SMA servers. NOTE: the vendor's position is that "we consider the probability of the success of such manipulation to be extremely low." Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected.