CVE-2024-50685

9.1 CRITICAL

📋 TL;DR

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in SunGrow iSolarCloud's powerStationService API model. Attackers can manipulate object references to access unauthorized data or functionality. All SunGrow iSolarCloud users before the October 31, 2024 remediation are affected.

💻 Affected Systems

Products:
  • SunGrow iSolarCloud
Versions: All versions before October 31, 2024 remediation
Operating Systems: Any OS running iSolarCloud
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the powerStationService API model specifically. Cloud-based deployments are primarily affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of solar monitoring and control systems, allowing attackers to manipulate power generation data, disrupt operations, or access sensitive customer information across multiple installations.

🟠

Likely Case

Unauthorized access to other users' solar power station data, including generation statistics, configuration details, and potentially control functions.

🟢

If Mitigated

Limited impact with proper authentication and authorization controls that validate user permissions for each object reference.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

IDOR vulnerabilities typically require some level of access but are easy to exploit once authenticated. Attackers can manipulate object IDs in API requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Remediation applied by October 31, 2024

Vendor Advisory: https://en.sungrowpower.com/security-notice-detail-2/6118

Restart Required: No

Instructions:

1. Contact SunGrow support for the latest security update. 2. Apply the remediation provided by SunGrow. 3. Verify that the powerStationService API now validates user permissions for all object references.

🔧 Temporary Workarounds

API Access Restriction

all

Restrict access to the powerStationService API endpoints to only authorized users and systems.

Input Validation

all

Implement server-side validation to ensure users can only access objects they're authorized for.

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for the powerStationService API endpoints
  • Deploy a web application firewall (WAF) with IDOR protection rules

🔍 How to Verify

Check if Vulnerable:

Test if you can access other users' power station data by manipulating object IDs in API requests to the powerStationService endpoint.

Check Version:

Check with SunGrow support for your current version and remediation status.

Verify Fix Applied:

Verify that attempting to access unauthorized objects via the powerStationService API returns proper authorization errors.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authorization attempts on powerStationService API
  • Unusual access patterns to power station objects

Network Indicators:

  • Unusual API requests to powerStationService with manipulated object IDs
  • Traffic from unexpected sources to solar monitoring endpoints

SIEM Query:

source="iSolarCloud" AND endpoint="powerStationService" AND (status=403 OR user_id!=requested_object_owner)

🔗 References

📤 Share & Export