PatchSiren cyber security CVE debrief
CVE-2025-30514 Growatt CVE debrief
CVE-2025-30514 is a medium-severity information disclosure issue in Growatt cloud applications, specifically the Growatt cloud portal version 3.6.0 and earlier. According to CISA’s advisory, an unauthenticated attacker can obtain restricted information about a user’s smart device collections (“scenes”). The published CVSS v3.1 vector is network-reachable with no privileges or user interaction required, but the impact is limited to confidentiality. CISA’s advisory also states that the cloud-based vulnerabilities were patched and that no user action is needed, while still recommending basic account hardening and vigilance.
- Vendor
- Growatt
- Product
- Cloud portal
- CVSS
- MEDIUM 5.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-15
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-15
- Advisory updated
- 2025-05-06
Who should care
Anyone using or administering Growatt cloud portal-managed smart devices should care, especially site owners, installers, and account administrators who rely on the portal to manage collections (“scenes”) and device settings.
Technical summary
CISA’s CSAF advisory for Growatt Cloud Applications lists Growatt cloud portal <=3.6.0 as affected. The issue is described as an unauthenticated, network-accessible disclosure of restricted information about a user’s smart device collections (“scenes”). The advisory metadata assigns CVSS v3.1 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), indicating low confidentiality impact and no integrity or availability impact. The advisory also states the cloud-based vulnerabilities were patched and that updates are automatic, with no user action needed.
Defensive priority
Medium
Recommended defensive actions
- Confirm you are using the latest Growatt cloud portal and device firmware available through normal update channels.
- Enable strong passwords for Growatt accounts and any associated administrative access.
- Enable multi-factor authentication where applicable.
- Review account activity and device access for anything unusual.
- Report security concerns to [email protected].
- Follow Growatt and CISA security guidance for ongoing hardening and monitoring.
Evidence notes
Primary facts come from CISA’s CSAF advisory ICSA-25-105-04 (Growatt Cloud Applications), published on 2025-04-15 and modified on 2025-05-06. The source corpus identifies Growatt cloud portal <=3.6.0 as affected, describes the unauthenticated disclosure of restricted scene information, and includes the CVSS v3.1 vector and remediation statements. The 2025-05-06 modification is recorded as a revision for typo fixes only.
Official resources
-
CVE-2025-30514 CVE record
CVE.org
-
CVE-2025-30514 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by CISA in ICSA-25-105-04 on 2025-04-15; the advisory was revised on 2025-05-06 for typo fixes.