SunPower

SunPower

A critical vulnerability (CVE-2025-9696, CVSS v4: 9.4) in SunPower’s PVS6 photovoltaic inverters allows attackers within 100 meters via Bluetooth Low Energy (BLE) to bypass authentication using hard-coded encryption keys, gaining full administrative control. Exploiting this flaw enables adversaries to replace firmware with malicious backdoors, disable power production, or alter grid-tie settings, risking grid instability, unsafe operating conditions, or forced offline states. Attackers can also establish persistent remote access via SSH tunnels, modify firewall rules to expose connected energy-storage systems, and compromise environmental sensors.The vulnerability affects global deployments across residential, commercial, and utility-scale sites in North America, Europe, Asia, and Australia, threatening critical energy infrastructure. All PVS6 units running firmware ≤ 2025.06 build 61839 are vulnerable. SunPower’s lack of coordination with CISA before disclosure exacerbates risks, leaving operators to implement emergency mitigations such as network isolation, BLE range restrictions, and VPN-enforced remote access while awaiting patches. Though no public exploitation is confirmed, the low attack complexity and high potential for economic/systems disruption demand urgent action to prevent large-scale energy sector compromise.

Source: https://cyberpress.org/sunpower-vulnerability/

TPRM report: https://www.rankiteo.com/company/sunpower-corporation

"id": "sun457090325",
"linkid": "sunpower-corporation",
"type": "Vulnerability",
"date": "6/2025",
"severity": "100",
"impact": "6",
"explanation": "Attack threatening the economy of geographical region"
{'affected_entities': [{'customers_affected': 'Operators of PVS6 inverters '
                                              '(residential, commercial, '
                                              'utility-scale)',
                        'industry': ['Renewable Energy',
                                     'Solar Technology',
                                     'Critical Infrastructure'],
                        'location': 'United States (HQ), Global Deployments '
                                    '(North America, Europe, Asia, Australia)',
                        'name': 'SunPower Corporation',
                        'type': 'Manufacturer'}],
 'attack_vector': ['Bluetooth Low Energy (BLE)',
                   'Hard-coded Credentials',
                   'Proximity-based Attack'],
 'customer_advisories': ['Residential/commercial solar system owners',
                         'Utility-scale energy providers'],
 'description': 'A high-severity flaw in SunPower’s PVS6 photovoltaic '
                'inverters (CVE-2025-9696, CVSS v4: 9.4) allows adversaries '
                'within Bluetooth Low Energy (BLE) range (~100 meters) to '
                'bypass authentication via hard-coded encryption parameters, '
                'granting full administrative access. Exploitation risks '
                'include firmware manipulation, grid instability, backdoor '
                'installation, and unauthorized remote access via SSH tunnels. '
                'The vulnerability affects all PVS6 units running firmware '
                '≤2025.06 build 61839, deployed globally across residential, '
                'commercial, and utility-scale energy infrastructure.',
 'impact': {'brand_reputation_impact': 'High (due to critical infrastructure '
                                       'risk and lack of coordinated '
                                       'disclosure)',
            'customer_complaints': 'Potential (from service disruptions)',
            'downtime': 'Potential (forced offline or unsafe operating '
                        'conditions)',
            'financial_loss': 'Potential (economic damage from grid '
                              'instability, downtime, or remediation costs)',
            'legal_liabilities': 'Potential (regulatory non-compliance, '
                                 'failure to engage CISA)',
            'operational_impact': ['Grid Instability',
                                   'Power Production Disruption',
                                   'Unsafe Operating Conditions',
                                   'Loss of Administrative Control'],
            'revenue_loss': 'Potential (from downtime, reputational damage, or '
                            'regulatory penalties)',
            'systems_affected': ['SunPower PVS6 Photovoltaic Inverters',
                                 'Connected Energy-Storage Systems',
                                 'Environmental Sensors',
                                 'Grid-Tie Infrastructure']},
 'initial_access_broker': {'backdoors_established': 'Potential (via firmware '
                                                    'replacement or SSH '
                                                    'tunnels)',
                           'entry_point': 'BLE interface with hard-coded '
                                          'credentials',
                           'high_value_targets': ['Grid-tie settings',
                                                  'Energy-storage systems',
                                                  'Administrative controls']},
 'investigation_status': 'Ongoing (no public exploitation reported; mitigation '
                         'urged)',
 'lessons_learned': ['Critical infrastructure vulnerabilities require '
                     'coordinated disclosure with agencies like CISA.',
                     'Hard-coded credentials in BLE interfaces pose severe '
                     'risks in proximity-based attacks.',
                     'Layered security (firewalls, VPNs, MFA, monitoring) is '
                     'essential for industrial control systems.',
                     'Proactive patch management and physical access controls '
                     'mitigate exploitation windows.'],
 'motivation': ['Potential Sabotage',
                'Grid Disruption',
                'Unauthorized Control',
                'Espionage',
                'Financial Gain (via ransomware or data theft)'],
 'post_incident_analysis': {'corrective_actions': ['Firmware patch to remove '
                                                   'hard-coded credentials',
                                                   'Enhanced authentication '
                                                   'mechanisms for BLE '
                                                   'interfaces',
                                                   'Mandatory CISA engagement '
                                                   'for critical '
                                                   'infrastructure '
                                                   'vulnerabilities'],
                            'root_causes': ['Hard-coded encryption keys in BLE '
                                            'servicing interface',
                                            'Lack of pre-disclosure '
                                            'coordination with CISA',
                                            'Insufficient physical access '
                                            'controls for proximity-based '
                                            'attacks']},
 'recommendations': ['Immediately isolate PVS6 servicing networks and apply '
                     'compensating controls.',
                     'Disable BLE interfaces when not actively used for '
                     'servicing.',
                     'Deploy VPNs with MFA for remote access and monitor for '
                     'anomalies.',
                     'Contact SunPower for firmware updates and integrity '
                     'validation.',
                     'Conduct risk assessments for grid-tie and connected '
                     'peripheral systems.',
                     'Implement intrusion detection for industrial protocols '
                     '(e.g., Modbus, DNP3).',
                     'Restrict physical access to inverters via shielding or '
                     'secure enclosures.'],
 'references': [{'source': 'Cybersecurity Advisory (Hypothetical)'}],
 'regulatory_compliance': {'regulatory_notifications': ['CISA engagement '
                                                        'lacking '
                                                        '(pre-disclosure)']},
 'response': {'communication_strategy': ['Public advisory (via media)',
                                         'Operator notifications '
                                         '(recommended)'],
              'containment_measures': ['Isolate inverter servicing networks '
                                       'behind dedicated firewalls',
                                       'Separate servicing networks from '
                                       'business/public networks',
                                       'Restrict BLE range via physical '
                                       'shielding or disabling interface',
                                       'Route remote access through VPNs with '
                                       'MFA'],
              'enhanced_monitoring': ['Intrusion detection for industrial '
                                      'control protocols',
                                      'Real-time inverter behavior monitoring',
                                      'Anomaly detection analytics'],
              'network_segmentation': 'Recommended (dedicated firewalls for '
                                      'servicing networks)',
              'remediation_measures': ['Apply firmware updates/patches (when '
                                       'available)',
                                       'Validate servicing interface integrity',
                                       'Disable BLE interface when not in '
                                       'use']},
 'stakeholder_advisories': ['Operators of PVS6 inverters',
                            'Energy sector CISOs',
                            'Critical infrastructure protection agencies'],
 'title': 'Critical Authentication Bypass Vulnerability in SunPower PVS6 '
          'Photovoltaic Inverters (CVE-2025-9696)',
 'type': ['Vulnerability Exploitation',
          'Authentication Bypass',
          'Unauthorized Access'],
 'vulnerability_exploited': {'affected_software': 'SunPower PVS6 firmware '
                                                  '≤2025.06 build 61839',
                             'cve_id': 'CVE-2025-9696',
                             'cvss_score': '9.4 (CVSS v4)',
                             'description': 'Hard-coded encryption parameters '
                                            'in BLE servicing interface, '
                                            'enabling authentication bypass '
                                            'and full administrative access.',
                             'patch_status': 'Pending (firmware update '
                                             'recommended)'}}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.