PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-30257 Growatt CVE debrief

CVE-2025-30257 is a medium-severity information-disclosure issue in Growatt's cloud portal. According to CISA's advisory, unauthenticated attackers can retrieve the serial number of smart meters associated with a specific user account. Growatt states the cloud-based vulnerabilities were patched and that no user action is needed, while also recommending basic account hygiene such as strong passwords and MFA where applicable.

Vendor
Growatt
Product
Cloud portal
CVSS
MEDIUM 5.3
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-15
Original CVE updated
2025-05-06
Advisory published
2025-04-15
Advisory updated
2025-05-06

Who should care

Organizations and individuals using Growatt cloud portal to manage smart meters should care, especially installers, operators, and administrators responsible for account security and device inventory.

Technical summary

CISA's CSAF advisory for ICSA-25-105-04 identifies Growatt cloud portal version <=3.6.0 as affected. The issue allows network-based, unauthenticated access to smart meter serial numbers associated with a user account. The CVSS v3.1 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, consistent with low confidentiality impact and no integrity or availability impact.

Defensive priority

Moderate. The vulnerability is externally reachable and requires no authentication, but the disclosed data is limited to serial numbers and the vendor reports the cloud-side issue was patched. Prioritize verification of exposure, vendor update status, and account protections.

Recommended defensive actions

  • Confirm whether any environments used Growatt cloud portal version 3.6.0 or earlier.
  • Verify that the vendor's cloud-side fix is in place and note that Growatt states no user action is needed.
  • Use strong passwords and enable multi-factor authentication where applicable.
  • Review account access and device inventories for unexpected changes or unusual activity.
  • Report security concerns to [email protected] as advised by the vendor.

Evidence notes

All facts are taken from CISA's CSAF advisory ICSA-25-105-04 and the linked official references. The advisory was first published on 2025-04-15 and revised on 2025-05-06 for typo fixes only. The source states the affected product is Growatt cloud portal <=3.6.0, the issue is unauthenticated serial-number disclosure, and Growatt reports the cloud vulnerabilities were patched. No KEV entry was supplied.

Official resources

Initial publication: 2025-04-15T06:00:00.000Z. Revision 2: 2025-05-06T06:00:00.000Z, described by CISA as typo fixes only.