PatchSiren cyber security CVE debrief
CVE-2025-25276 Growatt CVE debrief
CVE-2025-25276 is a medium-severity issue in Growatt cloud applications / cloud portal. CISA’s advisory says an unauthenticated attacker can hijack other users’ devices and potentially control them. The affected product is listed as Growatt cloud portal <=3.6.0. Growatt states the cloud-based vulnerabilities were patched and that no user action is needed, while also recommending strong passwords, MFA where applicable, and regular review of security settings for unusual activity.
- Vendor
- Growatt
- Product
- Cloud portal
- CVSS
- MEDIUM 5.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-15
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-15
- Advisory updated
- 2025-05-06
Who should care
Owners and operators of Growatt cloud portal deployments, plus users and installers who manage connected devices or accounts, should review account security and monitor for unusual device activity.
Technical summary
CISA classifies the issue as CVSS 3.1 5.3 MEDIUM with vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N. That means the attack is network-reachable, requires no privileges, and needs no user interaction. The advisory description is limited but explicitly states that an unauthenticated attacker can hijack other users’ devices and potentially control them. The supplied advisory does not add further exploitation details beyond the affected product scope and remediation guidance.
Defensive priority
Medium — prioritize because the issue is unauthenticated and does not require user interaction, even though the published CVSS impact is limited to integrity.
Recommended defensive actions
- Confirm whether any devices or services use Growatt cloud portal version 3.6.0 or earlier.
- Apply Growatt updates as provided; the advisory says the cloud-based vulnerabilities were patched and updates are automatic when available.
- Use strong passwords and enable multi-factor authentication where applicable.
- Review security settings regularly and watch for unusual device or account activity.
- Report security concerns to [email protected].
Evidence notes
Primary evidence comes from CISA’s CSAF advisory ICSA-25-105-04, published 2025-04-15 and revised 2025-05-06 for typo fixes. The advisory lists Growatt cloud portal <=3.6.0 as affected and states that an unauthenticated attacker can hijack other users’ devices and potentially control them. The remediation section says the cloud-based vulnerabilities were patched, updates are automatic when available, and users should use strong passwords, enable MFA where applicable, and review security settings. No KEV entry is provided in the supplied corpus.
Official resources
-
CVE-2025-25276 CVE record
CVE.org
-
CVE-2025-25276 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA published ICSA-25-105-04 / CVE-2025-25276 on 2025-04-15 and issued a revision on 2025-05-06 that the advisory says fixed typos.