DIVD-2025-00011 - Failed authentication check in Growatt portal
Our reference | DIVD-2025-00011 |
Case lead | Tom Wolters |
Researcher(s) |
|
CVE(s) | |
Products |
|
Versions |
|
Recommendation | The vulnerability has been remediated by the vendor. |
Patch status | Full patched |
Status | Open |
Last modified | 10 Jul 2025 10:38 CEST |
Summary
Due to an error in the authenticaiton feature of the plant transfer
function in the cloud platform of Growatt (either https://oss.growatt.com or https://server.growatt.com) failed to check authorisation when transfering an account from one account to another. A malicious users with a (free) installer account, could assign any plant to his account without this being noticable by the end user.
An attacker that is able to connect a significant number of plants with sufficient power and switches then at the right timing would potentially be able to disrupt the opwer grid.
What you can do
The vulnerability is in the cloud services of the vendor. The vendor remediated the vulnerability by disabling the plant transfer
functionallity. There is not action to be taken by the user.
What we are doing
We have disclosed the vulnerability to the vendor who, once we established contact, took prompt action.
Timeline
Date | Description |
---|---|
11 Apr 2025 | Vulnerability reported to DIVD |
11 Apr 2025 | First attempt to contact vendor |
23 Apr 2025 | Second attempt to contact vendor |
11 May 2025 | Vendor considered informed |
12 May 2025 | Third attempt to contact vendor |
04 Jun 2025 | Fourth attempt to contact vendor |
07 Jun 2025 | Vendor acknowledges contact |
11 Jun 2025 | Vendor receives full details |
11 Jun 2025 | Acknowledges receipt |
11 May 2025- 11 Jun 2025 |
Time to acknowledge |
13 Jun 2025 | Vendor fixes vunerability |
11 May 2025- 13 Jun 2025 |
Time to patch |
17 Jun 2025 | Vendor reports vulnerabilities as fixed |
More information
- : CVE-2025-29757
- [https://oss.growatt.com](https://oss.growatt.com0 - URL 1
- https://server.growatt.com