PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-31147 Growatt CVE debrief

CVE-2025-31147 affects the Growatt cloud portal and is rated Medium (CVSS 5.3). According to CISA’s advisory, unauthenticated attackers could query information about the total energy consumed by EV chargers belonging to arbitrary users. The advisory covers Growatt cloud portal versions up to 3.6.0. Growatt states the cloud-based vulnerabilities were patched and that no user action is needed, while also recommending standard account and device hygiene such as strong passwords, MFA where applicable, and review of security settings.

Vendor
Growatt
Product
Cloud portal
CVSS
MEDIUM 5.3
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-15
Original CVE updated
2025-05-06
Advisory published
2025-04-15
Advisory updated
2025-05-06

Who should care

Operators, administrators, and users of Growatt cloud portal deployments for EV charging should care, especially teams responsible for monitoring customer usage data, account access, and cloud-connected charging infrastructure.

Technical summary

The issue is an information disclosure condition in the Growatt cloud portal: unauthenticated remote access can be used to retrieve total-energy-consumption information for EV chargers tied to arbitrary users. The advisory identifies affected products as Growatt cloud portal versions <=3.6.0. The published CVSS v3.1 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating a network-reachable issue with low confidentiality impact and no integrity or availability impact.

Defensive priority

Medium. The exposure is externally reachable and requires no authentication, but the disclosed data is limited to confidentiality impact. Treat it as a priority for cloud portal operators handling user charging data, and verify patch status promptly.

Recommended defensive actions

  • Verify that all Growatt cloud portal instances are running the fixed version or the latest available update path.
  • Confirm whether any connected devices or cloud services still report as affected by versions <=3.6.0.
  • Review access controls and monitoring for unusual queries or data access patterns involving charging-usage information.
  • Use strong passwords and enable multi-factor authentication where applicable, as recommended in the advisory.
  • Follow Growatt’s guidance to stay vigilant and review security settings regularly.
  • Report security concerns to [email protected] if suspicious activity or exposure is identified.

Evidence notes

All substantive claims here are taken from the CISA CSAF advisory for ICSA-25-105-04/CVE-2025-31147 and its revision history. The published date used is 2025-04-15, and the 2025-05-06 modification is described by CISA as typo fixes only.

Official resources

CISA published the advisory on 2025-04-15 and later revised it on 2025-05-06 for typo fixes only.