PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-27561 Growatt CVE debrief

CVE-2025-27561 is a medium-severity issue in the Growatt cloud portal (up to version 3.6.0) where unauthenticated attackers could rename rooms belonging to arbitrary users. The CISA advisory was initially published on 2025-04-15 and later revised on 2025-05-06 for typo fixes. Growatt states the cloud-based vulnerabilities were patched and that no user action is needed, while still recommending basic account hardening and vigilance.

Vendor
Growatt
Product
Cloud portal
CVSS
MEDIUM 5.3
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-15
Original CVE updated
2025-05-06
Advisory published
2025-04-15
Advisory updated
2025-05-06

Who should care

Organizations and individuals using Growatt cloud portal deployments up to version 3.6.0 should care, especially admins, installers, and users who rely on room naming or other cloud-managed settings for device organization and monitoring.

Technical summary

The advisory describes an unauthenticated, network-reachable authorization flaw affecting the Growatt cloud portal. The reported impact is limited to integrity: attackers can rename rooms for arbitrary users. The supplied CVSS v3.1 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N, which aligns with a low-complexity remote issue that can alter data but does not indicate confidentiality or availability impact in the advisory.

Defensive priority

Medium. The issue is already reported as patched by the vendor, but it still matters for exposure assessment, account review, and confirming affected systems are on current versions.

Recommended defensive actions

  • Confirm whether any tenants or devices used the Growatt cloud portal at version 3.6.0 or earlier.
  • Verify that the vendor's cloud-side fix has taken effect in your environment.
  • Review room names and related configuration for unauthorized changes.
  • Use strong passwords and enable multi-factor authentication where applicable.
  • Monitor for unusual activity and report concerns to [email protected].
  • Follow Growatt and CISA guidance on secure configuration and defensive best practices.

Evidence notes

Source data from CISA's CSAF advisory identifies the affected product as 'Growatt cloud portal: <=3.6.0' and states that unauthenticated attackers can rename rooms of arbitrary users. The same advisory includes Growatt remediation notes stating the cloud-based vulnerabilities were patched and no user action is needed, while recommending password hygiene, MFA where applicable, and ongoing vigilance. The supplied CVSS 3.1 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N, matching a medium-severity integrity-only impact.

Official resources

Publicly disclosed in the CISA CSAF advisory on 2025-04-15; revised on 2025-05-06 for typo fixes. Use the published date, not the revision date, as the initial disclosure date.