CVE-2024-40117

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication and gain administrative privileges on Solar-Log 1000 devices by connecting to the web administration server. It affects Solar-Log 1000 devices running firmware versions before v2.8.2 and build 52-23.04.2013. Other Solar-Log models have different fixed versions as specified in the description.

💻 Affected Systems

Products:
  • Solar-Log 1000
Versions: Before v2.8.2 and build 52-23.04.2013
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Other Solar-Log models (SL 200, 500, 1000, 250, 300, 1200, 2000, SL 50 Gateway) have different fixed versions as mentioned in the description. The vulnerability specifically targets the web administration server component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Solar-Log device, allowing attackers to modify energy monitoring configurations, disrupt solar power operations, and potentially pivot to other network systems.

🟠

Likely Case

Unauthorized administrative access leading to manipulation of solar power monitoring data, configuration changes, and potential data exfiltration.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to the web administration interface.

🌐 Internet-Facing: HIGH - Web administration servers exposed to the internet are directly vulnerable to unauthenticated privilege escalation.
🏢 Internal Only: HIGH - Even internally, any user with network access to the device can exploit this vulnerability to gain administrative privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code is available on GitHub, making exploitation straightforward for attackers with network access to the vulnerable device.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.8.2 and build 52-23.04.2013 for Solar-Log 1000

Vendor Advisory: https://www.solar-log.com/en/support/firmware-database-1

Restart Required: Yes

Instructions:

1. Download the latest firmware from Solar-Log's firmware database. 2. Log into the Solar-Log web interface. 3. Navigate to the firmware update section. 4. Upload and apply the firmware update. 5. Reboot the device after update completion.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to the Solar-Log web administration interface using firewall rules.

iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

VPN Access Only

all

Place the Solar-Log device behind a VPN and require VPN authentication for all administrative access.

🧯 If You Can't Patch

  • Isolate the Solar-Log device on a separate VLAN with strict access controls
  • Implement network monitoring and alerting for unauthorized access attempts to the web administration port

🔍 How to Verify

Check if Vulnerable:

Check the firmware version in the Solar-Log web interface under System Information. If version is before v2.8.2 or build 52-23.04.2013, the device is vulnerable.

Check Version:

curl -s http://solar-log-ip/status.cgi | grep -i version

Verify Fix Applied:

After updating, verify the firmware version shows v2.8.2 or build 52-23.04.2013 or later in the System Information page.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized login attempts from unexpected IP addresses
  • Administrative actions performed from non-admin user accounts
  • Multiple failed login attempts followed by successful administrative access

Network Indicators:

  • Unusual traffic patterns to the web administration port (typically 80/443)
  • Connection attempts from external IP addresses to the Solar-Log device

SIEM Query:

source="solar-log" AND (event_type="admin_login" OR event_type="privilege_escalation") AND user!="admin"

🔗 References

📤 Share & Export