CVE-2017-9861
📋 TL;DR
SMA Solar Technology products have a SIP implementation vulnerability that lacks proper authentication and encryption, making them susceptible to replay attacks, packet injection, and man-in-the-middle attacks. Attackers within the LAN can crash devices, disrupt communications, exploit SIP vulnerabilities, or extract sensitive information like passwords. Only Sunny Boy TLST-21/TL-21 and Sunny Tripower TL-10/TL-30 models are potentially affected.
💻 Affected Systems
- Sunny Boy TLST-21
- Sunny Boy TL-21
- Sunny Tripower TL-10
- Sunny Tripower TL-30
📦 What is this software?
Sunny Central Storage 1000 Firmware by Sma
View all CVEs affecting Sunny Central Storage 1000 Firmware →
Sunny Central Storage 2200 Firmware by Sma
View all CVEs affecting Sunny Central Storage 2200 Firmware →
Sunny Central Storage 2500 Ev Firmware by Sma
View all CVEs affecting Sunny Central Storage 2500 Ev Firmware →
Sunny Central Storage 500 Firmware by Sma
View all CVEs affecting Sunny Central Storage 500 Firmware →
Sunny Central Storage 630 Firmware by Sma
View all CVEs affecting Sunny Central Storage 630 Firmware →
Sunny Central Storage 720 Firmware by Sma
View all CVEs affecting Sunny Central Storage 720 Firmware →
Sunny Central Storage 760 Firmware by Sma
View all CVEs affecting Sunny Central Storage 760 Firmware →
Sunny Central Storage 800 Firmware by Sma
View all CVEs affecting Sunny Central Storage 800 Firmware →
Sunny Central Storage 850 Firmware by Sma
View all CVEs affecting Sunny Central Storage 850 Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attackers to crash devices, extract passwords, disrupt solar monitoring/control, and potentially exploit other SIP vulnerabilities for further system access.
Likely Case
Unauthorized access to device communications, password extraction, and potential service disruption through packet injection attacks.
If Mitigated
Limited impact if devices are properly isolated on secure subnets with strict network segmentation and monitoring.
🎯 Exploit Status
Exploitation requires LAN access but no authentication. Attackers can eavesdrop, inject packets, or replay communications.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified
Vendor Advisory: http://www.sma.de/en/statement-on-cyber-security.html
Restart Required: No
Instructions:
No official patch available. Follow vendor security guidance and implement network isolation controls.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected devices on dedicated, firewalled subnetworks with no internet access
Access Control Lists
allImplement strict ACLs to limit SIP communication to authorized management systems only
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected devices from untrusted networks
- Monitor network traffic for unusual SIP communications and implement intrusion detection
🔍 How to Verify
Check if Vulnerable:
Check device model against affected list and verify SIP communication lacks encryption/authentication
Check Version:
Check device model via SMA monitoring interface or physical device labeling
Verify Fix Applied:
Verify network segmentation is properly implemented and SIP traffic is restricted to authorized systems
📡 Detection & Monitoring
Log Indicators:
- Unauthorized SIP connection attempts
- Device communication disruptions
- Multiple failed authentication attempts
Network Indicators:
- Unencrypted SIP traffic to/from affected devices
- SIP traffic from unauthorized IP addresses
- Unusual packet patterns in SIP communications
SIEM Query:
source_ip IN (affected_device_ips) AND protocol=sip AND (event_type=connection_attempt OR packet_size>threshold)
🔗 References
- http://www.sma.de/en/statement-on-cyber-security.html
- http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whitepaper-Cyber-Security-AEN1732_07.pdf
- https://horusscenario.com/CVE-information/
- http://www.sma.de/en/statement-on-cyber-security.html
- http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whitepaper-Cyber-Security-AEN1732_07.pdf
- https://horusscenario.com/CVE-information/