CVE-2025-15573
SolaX · SolaX Cloud MQTTS
SolaX devices fail to validate server certificates when connecting to the MQTTS server, enabling Man-in-the-Middle (MITM) attackers to intercept traffic and issue unauthorized commands.
Executive summary
A critical certificate validation failure in SolaX Cloud MQTTS connections allows attackers to perform Man-in-the-Middle attacks and gain unauthorized control over affected energy devices.
Vulnerability
Affected devices do not validate the server certificate when connecting to the SolaX Cloud MQTTS server (mqtt001.solaxcloud.com). This allows an unauthenticated attacker in a Man-in-the-Middle position to impersonate the legitimate server and send arbitrary commands to the device.
Business impact
Successful exploitation allows an attacker to manipulate energy storage or generation parameters, potentially causing hardware damage or disrupting power supply. The CVSS score of 9.4 reflects the critical nature of this flaw, which could lead to physical safety risks or significant operational downtime in industrial or residential settings.
Remediation
Immediate Action: Apply the latest firmware updates provided by SolaX to ensure that MQTTS certificate validation is strictly enforced.
Proactive Monitoring: Inspect network traffic for unauthorized DNS redirections or suspicious certificate usage related to the solaxcloud.com domain.
Compensating Controls: Isolate IoT and energy management devices on a dedicated, secured VLAN with restricted outbound access to prevent unauthorized network interception.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The failure to validate SSL/TLS certificates undermines the security of the entire communication channel. Organizations and homeowners using SolaX equipment must prioritize firmware updates to ensure the integrity of their energy management systems.