"Enphase Ignores CISA Request to Fix Remotely Exploitable Flaws"

The US Cybersecurity and Infrastructure Security Agency (CISA) recently issued advisories detailing two unpatched vulnerabilities in Enphase products.  Enpahse is an American energy technology company that sells solar micro-inverters, charging stations, and other energy equipment, mainly focused on residential customers.  The first flaw is tracked as CVE-2023-32274 (CVSS score of 8.6) and impacts the Enphase Installer Toolkit, a mobile solution that aids with the installation and configuration of Enphase Systems.  The application also allows users to connect to the Enphase Envoy communication gateway over wireless networks to perform system setups and allows them to view system status.  CISA warns that Enphase Installer Toolkit for Android versions 3.27.0 and older contain hardcoded credentials that an attacker could use to gain access to sensitive data.  CISA noted that successful exploitation of this vulnerability could allow sensitive information to be obtained by an attacker using hard-coded credentials.  The Enphase Installer Toolkit is currently available for download as version 3.30.0 for both Android and iOS.  The second vulnerability, CVE-2023-33869, is described as a command injection flaw in the Envoy communication gateway version D7.0.88, which could allow an attacker to gain root access to the affected product and execute commands.  According to CISA, Enphase Energy has not responded to requests to work with the agency in addressing these vulnerabilities. 

 

SecurityWeek reports: "Enphase Ignores CISA Request to Fix Remotely Exploitable Flaws"

Submitted by Anonymous on