The iSolarCloud Android app explicitly ignores SSL/TLS certificate validation errors, making it vulnerable to Man-in-the-Middle (MitM) attacks. An attacker could impersonate the iSolarCloud server, intercepting or modifying communications between the mobile app and the cloud, potentially leading to unauthorized access or data manipulation.
Affected Versions
Vulnerability Rating
CVE-2024-50691:6.5(AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N)
The scoring is based on the CVSS 3.1 standard. The scoring criteria can be referenced at
(https://www.first.org/cvss/calculator/3.1)
Mitigation and Remediation
Recommended Action: Customers should update the iSolarCloud Android App to the latest version via the official app store.
Patch Release: Available now.
Temporary Fix: Users should avoid connecting to public or untrusted Wi-Fi networks when using the iSolarCloud app.
Exploitation Status
No known exploitation in the wild.
Acknowledgments
This vulnerability was discovered and reported by Forescout Technologies.
Statement
All software updates, patches, and documentation provided by Sungrow Power Supply Co., Ltd. are the proprietary work of Sungrow. These materials may only be used for product maintenance and security improvements. Any unauthorized modification, distribution, decompilation, or reverse engineering is strictly prohibited.
Sungrow makes no express or implied warranties regarding the information provided, including but not limited to warranties of merchantability, fitness for a particular purpose, or non-infringement. Sungrow shall not be liable for any direct, indirect, incidental, or consequential damages arising from the use of this document or associated software.
Sungrow reserves the right to update or modify this document at any time without prior notice. Customers are responsible for implementing security updates in a timely manner to protect their systems.