CVE-2025-36745
📋 TL;DR
SolarEdge SE3680H inverters ship with an outdated Linux kernel containing unpatched vulnerabilities in core subsystems. Attackers with network or local access can exploit these flaws to achieve remote code execution, privilege escalation, or information disclosure. This affects all SolarEdge SE3680H inverters running the vulnerable kernel version.
💻 Affected Systems
- SolarEdge SE3680H
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the inverter system leading to remote code execution, privilege escalation to root, and potential lateral movement to other network systems.
Likely Case
Local privilege escalation allowing attackers to gain root access on the device, potentially leading to data theft or system manipulation.
If Mitigated
Limited impact if device is isolated from untrusted networks and access controls are strictly enforced.
🎯 Exploit Status
The CVE mentions both network and local access vectors. Exploitation likely requires knowledge of specific kernel vulnerabilities present in the outdated version.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://csirt.divd.nl/CVE-2025-36745
Restart Required: Yes
Instructions:
1. Contact SolarEdge support for firmware updates. 2. Apply any available firmware updates from SolarEdge. 3. Reboot the inverter after applying updates.
🔧 Temporary Workarounds
Network Isolation
allIsolate SolarEdge inverters from untrusted networks and the internet
Access Control
allImplement strict network access controls and firewall rules to limit access to inverter management interfaces
🧯 If You Can't Patch
- Segment the inverter network from critical infrastructure and user networks
- Implement strict monitoring and alerting for unusual access patterns to inverter systems
🔍 How to Verify
Check if Vulnerable:
Check kernel version on SolarEdge SE3680H device. If running outdated kernel (specific version not provided in CVE), device is vulnerable.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version has been updated to a patched version after applying firmware updates from SolarEdge.
📡 Detection & Monitoring
Log Indicators:
- Unusual process execution, privilege escalation attempts, kernel module loading
Network Indicators:
- Unexpected connections to/from inverter management ports, unusual network traffic patterns
SIEM Query:
source="solaredge" AND (event_type="privilege_escalation" OR event_type="kernel_exploit")