Archived

Here is the original study: Restrict Remote Access of PV Inverters from High-Risk Vendors

The European Solar Manufacturing Council (ESMC) has issued a stark warning, highlighting a critical threat to Europe’s energy autonomy stemming from the unregulated remote access capabilities of PV inverters produced by non-European, high-risk manufacturers—particularly those from China. A recent study by DNV substantiates these concerns.

As solar power becomes increasingly integral to Europe’s clean energy goals and energy security, a major vulnerability looms: software-enabled remote access to PV inverters—the essential control units of solar power systems.

[…]

The threat is real, not hypothetical. Internet connectivity is essential for modern inverters to perform grid support functions and participate in power markets. However, this connectivity also enables remote software updates, allowing manufacturers to potentially modify device performance from afar. This poses serious cybersecurity risks, including the danger of intentional disruption or large-scale shutdowns. A recent DNV report, commissioned by SolarPower Europe, highlights the credible risk of cascading blackouts due to coordinated or malicious manipulation of inverters.

  • futatorius@lemm.eeBanned from community
    link
    fedilink
    English
    arrow-up
    1
    ·
    15 hours ago

    Yeah, excellent suggestion. There’s no reason for a device to accept incoming requests from Chinese IP addresses for any reason. In fact, I’d keep them on the WAN and block anything incoming from the internet-- you can do a secure tunnel to your WAN if you really want remote access. I’d alert on outgoing requests and block them unless you confirm them. If the device is phoning home to Winnie, then consider blocking outgoing entirely.

    I’m not a security expert either, but the systems I build always pass security audits with no major findings, so I think my rules of thumb are good.