The Mojave Inverter uses the GET method for sensitive information.
Fixes

Solution

No solution given by the vendor.


Workaround

The Mojave Inverter was a product of Enersys. When Outback Power was split off from Enersys recently, Mojave Inverter was moved to Outback Power, but without the resources to maintain the product. Outback Power may discontinue this product and has not yet addressed these vulnerabilities. CISA recommends disabling the networking features of this product until a replacement product can be acquired.

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00043}

epss

{'score': 0.0005}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00054}

epss

{'score': 0.00043}


Wed, 19 Mar 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Outbackpower
Outbackpower mojave Inverter Oghi8048a
Outbackpower mojave Inverter Oghi8048a Firmware
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:h:outbackpower:mojave_inverter_oghi8048a:-:*:*:*:*:*:*:*
cpe:2.3:o:outbackpower:mojave_inverter_oghi8048a_firmware:-:*:*:*:*:*:*:*
Vendors & Products Outbackpower
Outbackpower mojave Inverter Oghi8048a
Outbackpower mojave Inverter Oghi8048a Firmware

Fri, 14 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Feb 2025 21:30:00 +0000

Type Values Removed Values Added
Description The Mojave Inverter uses the GET method for sensitive information.
Title Outback Power Mojave Inverter Use of GET Request Method With Sensitive Query Strings
Weaknesses CWE-598
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-02-14T15:47:58.188Z

Reserved: 2025-02-12T16:21:30.264Z

Link: CVE-2025-26473

cve-icon Vulnrichment

Updated: 2025-02-14T15:37:19.825Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-13T22:15:13.417

Modified: 2025-03-19T10:34:55.550

Link: CVE-2025-26473

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.