The Cybersecurity and Infrastructure Safety Company (CISA) has issued an pressing advisory warning a few essential vulnerability in SunPower PVS6 solar energy units that would enable attackers to achieve full management over the methods.
The flaw, tracked as CVE-2025-9696, stems from the usage of hardcoded credentials within the machine’s BluetoothLE interface, presenting a major risk to photo voltaic power infrastructure worldwide.
The vulnerability impacts SunPower PVS6 variations 2025.06 construct 61839 and prior, with a CVSS v4 rating of 9.4, indicating its essential severity.
Attackers positioned inside Bluetooth vary can exploit this weak spot to entry the machine’s servicing interface, enabling them to switch firmware, disable energy manufacturing, modify grid settings, create SSH tunnels, alter firewall configurations, and manipulate related units.
CISA analysts recognized that the vulnerability exploits hardcoded encryption parameters and publicly accessible protocol particulars inside the BluetoothLE implementation.
This design flaw transforms what needs to be a safe upkeep interface into an open gateway for malicious actors. The assault vector requires solely adjoining community entry with low complexity, making it notably regarding for photo voltaic installations in populated areas.
Technical Assault Mechanism and Exploitation
The vulnerability leverages the inherent weak spot within the PVS6’s authentication system, the place static credentials present a constant entry level for attackers.
As soon as an attacker establishes a Bluetooth connection utilizing these hardcoded parameters, they acquire administrative privileges equal to respectable service personnel.
The exploitation course of includes reverse-engineering the publicly obtainable protocol documentation to establish the authentication sequence.
# Simplified illustration of the vulnerability
bluetooth_connection = establish_ble_connection(target_device)
if authenticate_with_hardcoded_key(DEFAULT_SERVICE_KEY):
admin_access = True
execute_firmware_replacement()
modify_power_settings()
The assault’s sophistication lies in its simplicity – no advanced exploits or zero-day methods are required.
Attackers can probably develop automated instruments to scan for weak units and compromise them systematically.
The vulnerability’s impression extends past particular person units, as compromised items might function pivots to entry broader power infrastructure networks.
Notably, SunPower has not responded to CISA’s coordination makes an attempt, leaving customers with out official patches.
CISA recommends implementing community isolation, utilizing VPNs for distant entry, and deploying complete monitoring methods to detect unauthorized entry makes an attempt.
Organizations ought to prioritize updating affected units as soon as patches turn into obtainable and think about quickly disabling Bluetooth performance the place operationally possible.
Increase your SOC and assist your crew defend your corporation with free top-notch risk intelligence: Request TI Lookup Premium Trial.