SB2025031444 - Multiple vulnerabilities in Sungrow iSolarCloud Android App
Published: March 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Authorization bypass through user-controlled key (CVE-ID: CVE-2024-50687)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to multiple insecure direct object references (IDOR) within the devService API model. A remote attacker can gain unauthorized access to user data and potentially modify key identifying data values.
2) Authorization bypass through user-controlled key (CVE-ID: CVE-2024-50686)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to multiple insecure direct object references (IDOR) within the commonService API model. A remote attacker can gain unauthorized access to user data and potentially modify key identifying data values.
3) Authorization bypass through user-controlled key (CVE-ID: CVE-2024-50689)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to multiple insecure direct object references (IDOR) within the orgService API model. A remote attacker can gain unauthorized access to user data and potentially modify key identifying data values.
4) Authorization bypass through user-controlled key (CVE-ID: CVE-2024-50693)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to multiple insecure direct object references (IDOR) within the userService API model. A remote attacker can gain unauthorized access to user data and potentially modify key identifying data values.
5) Authorization bypass through user-controlled key (CVE-ID: CVE-2024-50685)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to multiple insecure direct object references (IDOR) within the powerStationService API model. A remote attacker can gain unauthorized access to user data and potentially modify key identifying data values.
Remediation
Install update from vendor's website.
References
- https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-12
- https://en.sungrowpower.com/security-notice-detail-2/6114
- https://en.sungrowpower.com/security-notice-detail-2/6112
- https://en.sungrowpower.com/security-notice-detail-2/6116
- https://en.sungrowpower.com/security-notice-detail-2/6120
- https://en.sungrowpower.com/security-notice-detail-2/6118