Solar Power World : Network security provider finds cyber vulnerabilities with three major inverter manufacturers

[[“value”:”

Renewable energy sources, including solar power systems, are rapidly becoming essential elements of power grids throughout the world — especially in the U.S. and Europe. However, cybersecurity for these systems is often an afterthought, creating a growing risk to grid security, stability and availability.

New research from network security solution provider Forescout found an insecure ecosystem — with dangerous energy and national security implications. While each residential solar system produces limited power, their combined output reaches dozens of gigawatts — making their collective impact on cybersecurity and grid reliability too significant to ignore.

In the full report, Forescout reviews known issues and presents new vulnerabilities found on three leading solar power system manufacturers: Sungrow, Growatt and SMA. Forescout also discusses realistic power grid attack scenarios that could be executed and could cause emergencies or blackouts, and provides recommended risk mitigation actions for owners of smart inverters, utilities, device manufacturers and regulators.

Summary of findings

Forescout cataloged 93 previous vulnerabilities on solar power and analyzed trends:
There’s an average of over 10 new vulnerabilities disclosed per year in the past three years
80% of those have a high or critical severity
32% have a CVSS score of 9.8 or 10 which generally means an attacker can take full control of an affected system
The most affected components are solar monitors (38%) and cloud backends (25%). Relatively few vulnerabilities (15%) affect solar inverters directly

Due to growing concerns over the dominance of foreign-made solar power components, Forescout analyzed their common countries of origin:
53% of solar inverter manufacturers are based in China
58% of storage system and 20% of the monitoring system manufacturers are in China
The second and third most common countries of origin for components are India and the US

New vulnerabilities:
Forescout analyzed six of the top 10 vendors of solar power systems worldwide: Huawei, Sungrow, Ginlong Solis, Growatt, GoodWe, and SMA
Forescout found 46 new vulnerabilities affecting different components in three vendors: Sungrow, Growatt and SMA.
These vulnerabilities enable scenarios that impact grid stability and user privacy
Some vulnerabilities also allow attackers to hijack other smart devices in users’ homes

Impact on Grid Security

The new vulnerabilities, which have now been fixed by the affected vendors, could allow attackers to take full control of an entire fleet of solar power inverters via a couple of scenarios, as shown in the report:

Once in control of these inverters, attackers can tamper with their power output settings or switch them off and on in a coordinated manner as a botnet. The combined effect of the hijacked inverters produces a large effect on power generation in a grid. The impact of this effect depends on that grid’s emergency generation capacity and how fast that can be activated.

The example Forescout discusses in the full report is that of the European grid. Previous research showed that control over 4.5 GW would be required to bring the frequency down to 49Hz — which mandates load shedding. Since current solar capacity in Europe is around 270 GW, it would require attackers to control less than 2% of inverters in a market that is dominated by Huawei, Sungrow and SMA.

Recommendations

Treat PV inverters in residential, commercial, and industrial installations as critical infrastructure:
Follow NIST guidelines for the cybersecurity of smart inverters in residential and commercial installations
Follow DOE recommendations for industrial installations

Owners of commercial and industrial installations should:
Include security requirements in procurement
Conduct a risk assessment when setting up devices
Ensure network visibility into solar power systems
Segment and monitor devices into their own sub-networks

Device manufacturers should:
Implement secure software lifecycle practices
Conduct regular penetration testing
Adopt security-in-depth strategies using web application firewalls
Use third-party audits of communication links based on standards, such as: ETSI EN 303 645, Radio Equipment Directive (RED) and Cyber Resilience Act (CRA)

News item from Forescout

You may also like:

“]] 

Source: Read More 

ENTER YOUR DETAILS IN THE FORM TO SIGN UP FOR OUR LATEST NEWS ALERTS.

ENTER YOUR DETAILS IN THE FORM TO SIGN UP FOR OUR LATEST NEWS ALERTS.

Sign Up For News Alerts

Sign Up For News Alerts

ENTER YOUR DETAILS IN THE FORM TO RECEIVE OUR PRESENTATION.

ENTER YOUR DETAILS IN THE FORM TO RECEIVE OUR PRESENTATION.