CVE-2020-25752
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue was discovered on Enphase Envoy R3.x and D4.x devices. There are hardcoded web-panel login passwords for the installer and Enphase accounts. The passwords for these accounts are hardcoded values derived from the MD5 hash of the username and serial number mixed with some static strings. The serial number can be retrieved by an unauthenticated user at /info.xml. These passwords can be easily calculated by an attacker; users are unable to change these passwords.
Se detectó un problema en los dispositivos Enphase Envoy R3.x y D4.x. Se presenta contraseñas de inicio de sesión del panel web embebidas para las cuentas del instalador y de Enphase. Las contraseñas para estas cuentas son valores codificados derivados del hash MD5 del nombre de usuario y el número de serie mezclado con algunas cadenas estáticas. El número de serie puede ser recuperado por un usuario no autenticado en el archivo /info.xml. Estas contraseñas pueden ser fácilmente calculadas por un atacante; unos usuarios no pueden cambiar estas contraseñas
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-09-18 CVE Reserved
- 2021-06-16 CVE Published
- 2024-03-01 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-798: Use of Hard-coded Credentials
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://stage2sec.com | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-fake-clean-energy-credits-4a7322e7661a | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://enphase.com/en-us/products-and-services/envoy-and-combiner | 2021-06-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Enphase Search vendor "Enphase" | Envoy Firmware Search vendor "Enphase" for product "Envoy Firmware" | d4.0 Search vendor "Enphase" for product "Envoy Firmware" and version "d4.0" | - |
Affected
| in | Enphase Search vendor "Enphase" | Envoy Search vendor "Enphase" for product "Envoy" | - | - |
Safe
|
Enphase Search vendor "Enphase" | Envoy Firmware Search vendor "Enphase" for product "Envoy Firmware" | r3.0 Search vendor "Enphase" for product "Envoy Firmware" and version "r3.0" | - |
Affected
| in | Enphase Search vendor "Enphase" | Envoy Search vendor "Enphase" for product "Envoy" | - | - |
Safe
|