PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-30514 Growatt CVE debrief

CVE-2025-30514 is a medium-severity information disclosure issue in Growatt cloud applications, specifically the Growatt cloud portal version 3.6.0 and earlier. According to CISA’s advisory, an unauthenticated attacker can obtain restricted information about a user’s smart device collections (“scenes”). The published CVSS v3.1 vector is network-reachable with no privileges or user interaction required, but the impact is limited to confidentiality. CISA’s advisory also states that the cloud-based vulnerabilities were patched and that no user action is needed, while still recommending basic account hardening and vigilance.

Vendor
Growatt
Product
Cloud portal
CVSS
MEDIUM 5.3
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-15
Original CVE updated
2025-05-06
Advisory published
2025-04-15
Advisory updated
2025-05-06

Who should care

Anyone using or administering Growatt cloud portal-managed smart devices should care, especially site owners, installers, and account administrators who rely on the portal to manage collections (“scenes”) and device settings.

Technical summary

CISA’s CSAF advisory for Growatt Cloud Applications lists Growatt cloud portal <=3.6.0 as affected. The issue is described as an unauthenticated, network-accessible disclosure of restricted information about a user’s smart device collections (“scenes”). The advisory metadata assigns CVSS v3.1 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), indicating low confidentiality impact and no integrity or availability impact. The advisory also states the cloud-based vulnerabilities were patched and that updates are automatic, with no user action needed.

Defensive priority

Medium

Recommended defensive actions

  • Confirm you are using the latest Growatt cloud portal and device firmware available through normal update channels.
  • Enable strong passwords for Growatt accounts and any associated administrative access.
  • Enable multi-factor authentication where applicable.
  • Review account activity and device access for anything unusual.
  • Report security concerns to [email protected].
  • Follow Growatt and CISA security guidance for ongoing hardening and monitoring.

Evidence notes

Primary facts come from CISA’s CSAF advisory ICSA-25-105-04 (Growatt Cloud Applications), published on 2025-04-15 and modified on 2025-05-06. The source corpus identifies Growatt cloud portal <=3.6.0 as affected, describes the unauthenticated disclosure of restricted scene information, and includes the CVSS v3.1 vector and remediation statements. The 2025-05-06 modification is recorded as a revision for typo fixes only.

Official resources

Publicly disclosed by CISA in ICSA-25-105-04 on 2025-04-15; the advisory was revised on 2025-05-06 for typo fixes.