First published: Tue Apr 15 2025(Updated: )
Unauthenticated attackers can trigger device actions associated with specific "scenes" of arbitrary users.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Growatt Cloud Portal |
Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions: * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.) * Use strong passwords and enable multi-factor authentication where applicable. * Report any security concerns to Service@Growatt.com. * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-31360 has been rated as a critical vulnerability due to its potential for unauthenticated access by attackers.
To mitigate CVE-2025-31360, upgrade the Growatt Cloud Portal to version 3.6.1 or later.
CVE-2025-31360 allows unauthenticated attackers to trigger unauthorized device actions linked to user-defined scenes.
CVE-2025-31360 affects versions of Growatt Cloud Portal up to and including 3.6.0.
Users of the affected version of Growatt Cloud Portal may face unauthorized device control and potential breaches of privacy.