PatchSiren cyber security CVE debrief
CVE-2025-26857 Growatt CVE debrief
CVE-2025-26857 is a Growatt cloud portal issue affecting versions up to 3.6.0. According to the CISA advisory, an unauthenticated attacker could rename arbitrary devices belonging to arbitrary users, including EV chargers. CISA published the advisory on 2025-04-15 and later revised it on 2025-05-06 for typo fixes. Growatt states the cloud-based vulnerabilities were patched and that no user action is needed, while still recommending stronger account protections and vigilance.
- Vendor
- Growatt
- Product
- Cloud portal
- CVSS
- MEDIUM 5.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-15
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-15
- Advisory updated
- 2025-05-06
Who should care
Growatt cloud portal users, installers, operators of EV chargers managed through the platform, and administrators responsible for monitoring device names and account activity.
Technical summary
The advisory describes an unauthenticated, network-reachable issue in the Growatt cloud portal affecting Growatt cloud portal: <=3.6.0. The stated impact is unauthorized renaming of devices owned by other users. The published CVSS v3.1 vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating low confidentiality impact in the scoring record and no listed integrity or availability impact in the vector, despite the advisory’s device-renaming description.
Defensive priority
Moderate. The issue is remotely reachable and requires no authentication, but the advisory indicates vendor-side remediation has already been applied and no user action is needed for the cloud vulnerability itself.
Recommended defensive actions
- Confirm whether any managed devices are on the affected Growatt cloud portal version scope (<=3.6.0).
- Review device names and recent account activity for unexpected changes, especially for EV chargers.
- Use strong passwords and enable multi-factor authentication where available.
- Follow Growatt’s guidance and keep devices on the latest firmware when updates are available.
- Report suspicious activity or security concerns to [email protected].
- Monitor official CISA and Growatt advisories for any follow-up guidance.
Evidence notes
Primary evidence comes from the CISA CSAF advisory ICSA-25-105-04, titled "Growatt Cloud Applications," published 2025-04-15 and revised 2025-05-06 for typo fixes. The advisory states that unauthenticated attackers can rename arbitrary devices of arbitrary users and identifies the affected product as Growatt cloud portal <=3.6.0. Growatt’s remediation notes state the cloud-based vulnerabilities were patched and no user action is needed.
Official resources
-
CVE-2025-26857 CVE record
CVE.org
-
CVE-2025-26857 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by CISA in advisory ICSA-25-105-04 on 2025-04-15; revised on 2025-05-06 for typo fixes. This is not a KEV-listed item in the provided data.