Known Vulnerabilities for products from Enphase

Listed below are 9 of the newest known vulnerabilities associated with the vendor "Enphase".

These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.

Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2023-33869 json Enphase Envoy versions D7.0.88 is vulnerable to a command injection exploit that may allow an attacker to execute root comma... 9.8 - CRITICAL 2023-06-20 2023-06-28
CVE-2023-32274 json Enphase Installer Toolkit versions 3.27.0 has hard coded credentials embedded in binary code in the Android application.... 7.5 - HIGH 2023-06-20 2023-06-28
CVE-2020-25755 json An issue was discovered on Enphase Envoy R3.x and D4.x (and other current) devices. The upgrade_start function in /installer/... 8.8 - HIGH 2021-06-16 2022-05-03
CVE-2020-25754 json An issue was discovered on Enphase Envoy R3.x and D4.x devices. There is a custom PAM module for user authentication that cir... 7.5 - HIGH 2021-06-16 2021-06-28
CVE-2020-25753 json An issue was discovered on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the las... 9.8 - CRITICAL 2021-06-16 2021-06-28
CVE-2020-25752 json An issue was discovered on Enphase Envoy R3.x and D4.x devices. There are hardcoded web-panel login passwords for the install... 5.3 - MEDIUM 2021-06-16 2021-06-24
CVE-2019-7678 json A directory traversal vulnerability was discovered in Enphase Envoy R3.*.* via images/, include/, include/js, or include/css ... 9.8 - CRITICAL 2019-02-09 2019-02-12
CVE-2019-7677 json XSS exists in Enphase Envoy R3.*.* via the profileName parameter to the /home URI on TCP port 8888. 6.1 - MEDIUM 2019-02-09 2019-02-11
CVE-2019-7676 json A weak password vulnerability was discovered in Enphase Envoy R3.*.*. One can login via TCP port 8888 with the admin password... 7.2 - HIGH 2019-02-09 2020-08-24

Known software with vulnerabilities from Enphase

Type Vendor Product Version
ApplicationEnphaseEnvoy3.0.0