The MOD3 command traffic between the monitoring application and the inverter is transmitted in plaintext without encryption or obfuscation. This vulnerability may allow an attacker with access to a local network to intercept, manipulate, replay, or forge critical data, including read/write operations for voltage, current, and power configuration, operational status, alarms, telemetry, system reset, or inverter control commands, potentially disrupting power generation or reconfiguring inverter settings.
History

Tue, 12 Aug 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Eg4 Electronics
Eg4 Electronics eg4 12000xp
Eg4 Electronics eg4 12kpv
Eg4 Electronics eg4 18kpv
Eg4 Electronics eg4 6000xp
Eg4 Electronics eg4 Flex 18
Eg4 Electronics eg4 Flex 21
Eg4 Electronics eg4 Gridboss
Vendors & Products Eg4 Electronics
Eg4 Electronics eg4 12000xp
Eg4 Electronics eg4 12kpv
Eg4 Electronics eg4 18kpv
Eg4 Electronics eg4 6000xp
Eg4 Electronics eg4 Flex 18
Eg4 Electronics eg4 Flex 21
Eg4 Electronics eg4 Gridboss

Fri, 08 Aug 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 08 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Description The MOD3 command traffic between the monitoring application and the inverter is transmitted in plaintext without encryption or obfuscation. This vulnerability may allow an attacker with access to a local network to intercept, manipulate, replay, or forge critical data, including read/write operations for voltage, current, and power configuration, operational status, alarms, telemetry, system reset, or inverter control commands, potentially disrupting power generation or reconfiguring inverter settings.
Title EG4 Electronics EG4 Inverters Cleartext Transmission of Sensitive Information
Weaknesses CWE-319
References
Metrics cvssV3_1

{'score': 6.9, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}

cvssV4_0

{'score': 7.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2025-08-08T16:00:43.694Z

Updated: 2025-08-08T16:12:28.064Z

Reserved: 2025-07-30T19:03:10.056Z

Link: CVE-2025-52586

cve-icon Vulnrichment

Updated: 2025-08-08T16:12:20.324Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-08T16:15:27.617

Modified: 2025-08-08T20:30:18.180

Link: CVE-2025-52586

cve-icon Redhat

No data.