35,000 solar PV devices hit by dozens of vulnerabilities and weaknesses: is yours one of them?
Internet-exposed solar systems are soft targets for gaining network access

- Forescout report finds many vulnerable solar devices run outdated firmware with known exploits active in the wild
- Europe holds 76% of all exposed solar power devices, with Germany and Greece particularly at risk
- SolarView Compact exposure jumped 350% in two years, and it's already linked to cybercrime
The rapid growth of solar energy adoption worldwide has sparked renewed concerns about cybersecurity vulnerabilities within solar infrastructure.
A study by Forescout’s Vedere Labs found nearly 35,000 solar power devices, including inverters, data loggers, and gateways, are exposed to the internet, making them susceptible to exploitation.
These findings follow a previous report by Forescout which identified 46 vulnerabilities in solar power systems.
High exposure and geopolitical implications
What’s particularly alarming now is that many of these devices remain unpatched, even as cyber threats grow more sophisticated.
Ironically, vendors with the highest number of exposed devices aren’t necessarily those with the largest global installations, suggesting issues such as poor default security configurations, insufficient user guidance, or unsafe manual settings.
Forescout found Europe accounts for a staggering 76% of all exposed devices, with Germany and Greece most affected.
While an internet-exposed solar system isn’t automatically vulnerable, it becomes a soft target for cybercriminals. For example, the SolarView Compact device experienced a 350% increase in online exposure over two years and was implicated in a 2024 cyber incident involving bank account theft in Japan.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Concerns around solar infrastructure deepened when Reuters reported rogue communication modules in Chinese-manufactured inverters.
Although not tied to a specific attack, the discovery prompted several governments to reevaluate the security of their energy systems.
According to Forescout, insecure configurations are common, and many devices still run outdated firmware versions. Some are known to have vulnerabilities currently under active exploitation.
Devices like the discontinued SMA Sunny WebBox still account for a significant share of exposed systems.
This is not just a matter of faulty products, it reflects a system-wide risk. While individually limited in impact, these internet-exposed devices may serve as entry points into critical infrastructure.
To mitigate risk, organizations should retire devices that cannot be patched and avoid exposing management interfaces to the internet.
For remote access, secure solutions such as VPNs, along with adherence to CISA and NIST guidelines, are essential.
Additionally, a layered approach using top-rated antivirus tools, endpoint protection solutions, and especially Zero Trust Network Access (ZTNA) architecture may be necessary to keep critical systems insulated from intrusion.
You might also like
- Experts warn GTA and Minecraft being used to lure in cyberattack victims
- These are the best green web hosting providers
- We’ve rounded up a list of the best web hosting providers

Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master's and a PhD in sciences, which provided him with a solid foundation in analytical thinking. Efosa developed a keen interest in technology policy, specifically exploring the intersection of privacy, security, and politics. His research delves into how technological advancements influence regulatory frameworks and societal norms, particularly concerning data protection and cybersecurity. Upon joining TechRadar Pro, in addition to privacy and technology policy, he is also focused on B2B security products. Efosa can be contacted at this email: udinmwenefosa@gmail.com
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.