First published: Tue Apr 15 2025(Updated: )
Unauthenticated attackers can rename arbitrary devices of arbitrary users (i.e., EV chargers).
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Growatt Cloud Portal |
Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions: * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.) * Use strong passwords and enable multi-factor authentication where applicable. * Report any security concerns to Service@Growatt.com. * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26857 has a high severity as it allows unauthenticated attackers to rename devices belonging to users.
To mitigate CVE-2025-26857, users should upgrade the Growatt Cloud Portal to version 3.6.0 or later.
CVE-2025-26857 affects users of the Growatt Cloud Portal prior to version 3.6.0.
CVE-2025-26857 targets EV chargers linked to the Growatt Cloud Portal.
While you can still use the Growatt Cloud Portal, it is recommended to upgrade to avoid the vulnerabilities associated with CVE-2025-26857.