How your solar roof has become a national security problem


James Showalter describes a fairly specific nightmare scenario if not entirely improbable. Someone goes up to your house, cracks your Wi-Fi password, then starts playing with the solar inverter mounted next to your garage. This unpretentious gray box converts the direct current of your roof panels into an alternating current that feeds your home.

“You must have a solar harassment” so that this scenario is played out, explains Showalter, describing the kind of person who needs to present himself physically in your alley with the technical know-how and the motivation to hack your domestic energy system.

The CEO of EG4 ElectronicsA company based in Sulfur Springs, Texas, does not consider this sequence of particularly probable events. However, this is why his company last week ended up under the spotlight when the American cybersecurity agency Cisa published an opinion Cetail the security vulnerabilities in EG4 solar inverters. The faults, noted CISA, could allow an attacker to have access to the same network as a affected inverter and its serial number to intercept the data, install a malicious firmware or take control of the entire system.

For approximately 55,000 customers who have the eG4 -affected inverter model, the episode was probably a disturbing introduction to a device that they little include. What they learn is that modern solar inverters are no longer simple power converters. They now serve as the backbone of domestic energy installations, performance monitoring, to communicate with public service companies and, when there is an excess of energy, to strengthen it in the network.

Much of this has happened without people noticing it. “No one knew what a solar inverter was five years ago,” observes Justin Pascale, principal consultant at Dragos, a cybersecurity company specializing in industrial systems. “We are now talking about it at national and international level.”

Safety and customer complaints

Some of the numbers highlight the extent to which individual houses in the United States become miniature plants. According to the US Energy Information Administration, small -scale solar installations – mainly residential – increased more than five times Between 2014 and 2022. What was formerly the province of climate defenders and the first adopters became more common due to the drop in costs, government incentives and a growing awareness of climate change.

Techcrunch event

San Francisco
|
October 27-29, 2025

Each solar installation adds another node to an expanding network of interconnected devices, each contributing to energy independence but also becoming a potential entry point for a malicious person.

When he has been in a hurry on his business security standards, Showalter recognizes his shortcomings, but he also deems. “This is not an EG4 problem,” he says. “This is a problem on the industry level.” During a zoom call and later, in the reception box of this publisher, he produced a 14 pages report Cataloging 88 Disclins of solar energy vulnerability through commercial and residential applications since 2019.

All its customers – some of which Reddit taken To complain – are sympathetic, in particular since the opinion of the CISA revealed defects of fundamental design: communication between the surveillance applications and the inverters which occurred in unacyed raw text, the updates of the firmware which lacked integrity checks and the rudimentary authentication procedures.

“These are basic security towers,” said a company customer, who asked to speak anonymously. “Add the insult to the injury,” continues this individual, “EG4 did not even bother to inform me or offer suggested attenuations.”

When asked why EG4 had not alerted customers immediately when Cisa contacted the company, Showalter calls it a moment “Live and learns”.

“Because we are so close (to respond to the concerns of the CISA) and it is such a positive relationship with the CISA, we were going to arrive on the” fact “button, then advise people, so we are not in the middle of the cooked cake,” explains Showalter.

Techcrunch contacted Cisa earlier this week for more information; The agency did not respond. In its opinion on the EG4, the CISA declares that “no known public exploitation specifically targeting these vulnerabilities has been reported to the CISA at the moment”.

Connections with Safety Safety Problems Spark

Although unrelated, the time of the EG4 public relations crisis coincides with wider anxieties concerning the security of the supply chain for renewable energy equipment.

Earlier this year, American energy officials would have started to reassess the risks posed by devices made in China after discovering unexplained communication equipment inside certain inverters and batteries. According to a Reuters investigationUnparalleled cellular radios and other communication devices have been found in the equipment of several Chinese suppliers – components that had not appeared on lists of official equipment.

This reported discovery has a particular weight given the domination of China in solar manufacturing. This same story of Reuters noted that Huawei is the world’s largest supplier of inverters, representing 29% of expeditions in the world in 2022, followed by Chinese peers Sungrow and Ginlong Solis. A few 200 GW of European solar energy capacity is linked to the inverters manufactured in China, which is more than 200 nuclear power plants.

Geopolitical implications have not escaped notice. Lithuania last year adopted Blocking Chinese access remotely to solar, wind turbines and battery more than 100 kilowatts, effectively restricting the use of Chinese inverters. Showalter says that his business responds to customer concerns by starting in a similar way to move away from Chinese suppliers and to components manufactured by companies elsewhere, including in Germany.

But the vulnerabilities described by CISA described in EG4 systems raise questions that extend beyond the practices of a single company or where it gets its components. The agency of American standards NIST warnings That “if you control a sufficiently large number of solar inverters at home and do something harmful at the same time, it could have catastrophic implications at the grid for an extended period.”

The good news (if there is one) is that although theoretically possible, this scenario faces many practical limitations.

Pascale, who works with solar installations on the scale of public services, notes that residential inverters serve mainly two functions: convert the power of the short duration alternately and facilitate connection to the network. A mass attack would require a large number of individual houses simultaneously. (Such attacks are not impossible but are more likely to involve the targeting of the manufacturers themselves, some of which have remote access to the solar inverters of their customers, as Avoided by safety researchers last year.)

The regulatory framework that governs larger installations does not currently extend to residential systems. Standards for the protection of critical infrastructure of the North American Electric Reliabibility Corporation Apply Only larger installations producing 75 or more megawatts, such as solar farms.

Since residential installations fall so far below these thresholds, they operate in a regulatory gray area where cybersecurity standards remain suggestions rather than requirements.

But the final result is that the safety of thousands of small installations depends largely on the discretion of individual manufacturers who operate in a regulatory vacuum.

On the question of the transmission of non -encrypted data, for example, which is one of the reasons why EG4 received that the slap on the hand of Cisa, Pascale notes that in operational environments on a usefulness scale, the transmission of raw text is common and sometimes encouraged for network surveillance purposes.

“When you look at encryption in a business environment, it is not allowed,” he explains. “But when you look at an operational environment, most things are transmitted in raw text.”

The real concern is not an immediate threat to individual owners. Instead, it is linked to the overall vulnerability of a rapid expansion network. As the energy network becomes more and more distributed, the power from millions of small sources rather than dozens of large, the attack surface is developing exponentially. Each inverter represents a potential pressure point in a system that has never been designed to adapt to this level of complexity.

Showalter adopted Cisa’s intervention as what he calls an “upgrading of confidence” – an opportunity to differentiate his business in a crowded market. He says that since June, EG4 has been working with the agency to respond to identified vulnerabilities, reducing an initial list of ten concerns with three remaining elements that the company plans to resolve by October. The process has consisted in updating the firmware transmission protocols, implementing additional identity verification for technical support calls and redoing authentication procedures.

But for customers like the anonymous EG4 customer who spoke with frustration of the company’s response, the episode highlights the strange position in which solar adopters are found. EG4 customers had bought what they understood to be climate cybersecurity technology, only few involuntary participants in a landscape of Kniotty cybersecurity seem entirely understanding.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *