PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-31950 Growatt CVE debrief

CVE-2025-31950 is a Growatt cloud portal issue affecting versions <=3.6.0, where an unauthenticated attacker can obtain other users’ EV charger energy consumption information. CISA published the advisory on 2025-04-15 and later revised it on 2025-05-06 for typo fixes; the vendor states the cloud-based vulnerabilities were patched and no user action is needed.

Vendor
Growatt
Product
Cloud portal
CVSS
MEDIUM 5.3
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-15
Original CVE updated
2025-05-06
Advisory published
2025-04-15
Advisory updated
2025-05-06

Who should care

Operators, installers, and users of Growatt cloud portal-connected EV charging systems should pay attention, along with security teams responsible for cloud-connected energy or OT/IoT deployments.

Technical summary

The advisory describes a network-reachable information disclosure condition in the Growatt cloud portal. The provided CVSS 3.1 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, reflecting no authentication required, low attack complexity, and limited confidentiality impact only. The affected product listed in the CSAF advisory is Growatt cloud portal <=3.6.0.

Defensive priority

Medium. This is a privacy/confidentiality exposure rather than an integrity or availability issue, but it affects unauthenticated access to user energy-consumption data in a cloud service.

Recommended defensive actions

  • Confirm whether any deployed Growatt cloud portal components are at or below version 3.6.0.
  • Apply vendor-provided updates; the advisory states cloud-based vulnerabilities were patched and updates are automatic.
  • Use strong passwords and enable multi-factor authentication where applicable.
  • Review security settings regularly and report unusual activity.
  • If you identify security concerns, contact Growatt at [email protected].

Evidence notes

Primary evidence comes from the CISA CSAF advisory ICSA-25-105-04 and its source JSON, which identify the issue as an unauthenticated ability to obtain other users’ EV charger energy consumption information. The advisory lists Growatt cloud portal <=3.6.0 as affected and includes vendor remediation guidance stating the cloud vulnerabilities were patched and no user action is needed. Published date used here is 2025-04-15, with a later advisory revision on 2025-05-06 for typos only.

Official resources

CISA published the advisory on 2025-04-15 and revised it on 2025-05-06; the revision history in the source indicates the later update was for typo fixes. The CVE description provided by the source states that an unauthenticated attacker can