|
| 1 | +[schema] |
| 2 | +version = "0.1.0" |
| 3 | + |
| 4 | +[snapshot] |
| 5 | +captured = 2025-11-13T16:23:10.739784Z |
| 6 | + [[snapshot.cve5]] |
| 7 | + id = "CVE-2025-26857" |
| 8 | + published = 2025-04-15T21:12:13.452000Z |
| 9 | + reserved = 2025-04-01T17:32:00.724000Z |
| 10 | + updated = 2025-04-16T15:08:48.134000Z |
| 11 | + |
| 12 | + [snapshot.cve5.digest] |
| 13 | + xxh128 = "3e60fd753e23fe8c25dcbc5cf0fa182a" |
| 14 | + |
| 15 | + [snapshot.cve5.overview] |
| 16 | + urls = ["https://nvd.nist.gov/vuln/detail/CVE-2025-26857"] |
| 17 | + cna = "icscert" |
| 18 | + description = """Unauthenticated attackers can rename arbitrary devices of arbitrary users (i.e., EV chargers).""" |
| 19 | + references = [ |
| 20 | + "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", |
| 21 | + ] |
| 22 | + remediations = [ |
| 23 | + "Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:\n\n * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.)\n * Use strong passwords and enable multi-factor authentication where applicable.\n * Report any security concerns to [email protected].\n * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity.", |
| 24 | + ] |
| 25 | + [[snapshot.nvd]] |
| 26 | + id = "CVE-2025-26857" |
| 27 | + published = 2025-04-15T22:15:17.360000 |
| 28 | + updated = 2025-04-16T13:25:37.340000 |
| 29 | + |
| 30 | + |
| 31 | +[curator] |
| 32 | +converted_from_cve5 = true |
| 33 | + |
| 34 | +[vuln] |
| 35 | +id = "ANCHORE-2025-14738" |
| 36 | + |
| 37 | + [[vuln.providers.nvd]] |
| 38 | + id = "CVE-2025-26857" |
| 39 | + |
| 40 | + [vuln.providers.nvd.enrichment] |
| 41 | + reason = "Added CPE configurations because not yet analyzed by NVD." |
| 42 | + |
| 43 | + [[vuln.providers.nvd.products.override.cve5]] |
| 44 | + vendor = "Growatt" |
| 45 | + product = "Cloud portal" |
| 46 | + [[vuln.providers.nvd.products.override.cve5.cpe]] |
| 47 | + vendor = "growatt" |
| 48 | + product = "cloud_portal" |
| 49 | + [[vuln.providers.nvd.products.override.cve5.affected]] |
| 50 | + [vuln.providers.nvd.products.override.cve5.affected.version] |
| 51 | + scheme = "custom" |
| 52 | + greater_than_or_equal = "0" |
| 53 | + less_than = "3.6.0" |
| 54 | + [[vuln.providers.nvd.products.override.cve5.affected.remediation]] |
| 55 | + version = "3.6.0" |
0 commit comments