Growatt Cloud Applications
Growatt cloud portal versions 3.6.0 and earlier contain cross-site scripting (XSS), improper authorization (CWE-639), insecure cryptographic storage (CWE-351), and insufficient input validation (CWE-15) vulnerabilities. These flaws allow unauthenticated attackers to compromise confidentiality, inject malicious code, and execute arbitrary commands on the cloud platform and connected solar inverter devices. The vendor has patched the vulnerabilities server-side; the cloud portal is automatically updated. However, users should secure their accounts and limit network exposure.
- Network access to the Growatt cloud portal (internet-facing)
- No authentication required for initial exploitation
- Administrator/installer must access the portal for credential theft or device compromise
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6953a594-4d38-4ea5-8d80-c1427ca6540fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.