Skip to content

Commit 3d3ea31

Browse files
committed
updates 2025-11-13
Signed-off-by: Weston Steimel <[email protected]>
1 parent d45822a commit 3d3ea31

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

55 files changed

+2876
-15
lines changed
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
[schema]
2+
version = "0.1.0"
3+
4+
[snapshot]
5+
captured = 2025-11-13T16:22:46.598026Z
6+
[[snapshot.cve5]]
7+
id = "CVE-2025-31933"
8+
published = 2025-04-15T20:17:05.854000Z
9+
reserved = 2025-04-01T17:44:07.318000Z
10+
updated = 2025-04-16T15:10:38.283000Z
11+
12+
[snapshot.cve5.digest]
13+
xxh128 = "3e60fd753e23fe8c25dcbc5cf0fa182a"
14+
15+
[snapshot.cve5.overview]
16+
urls = ["https://nvd.nist.gov/vuln/detail/CVE-2025-31933"]
17+
cna = "icscert"
18+
description = """An unauthenticated attacker can check the existence of usernames in the system by querying an API."""
19+
references = [
20+
"https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04",
21+
]
22+
remediations = [
23+
"Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:\n\n * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.)\n * Use strong passwords and enable multi-factor authentication where applicable.\n * Report any security concerns to [email protected].\n * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity.",
24+
]
25+
[[snapshot.nvd]]
26+
id = "CVE-2025-31933"
27+
published = 2025-04-15T21:16:04.063000
28+
updated = 2025-04-16T13:25:37.340000
29+
30+
31+
[curator]
32+
converted_from_cve5 = true
33+
34+
[vuln]
35+
id = "ANCHORE-2025-14643"
36+
37+
[[vuln.providers.nvd]]
38+
id = "CVE-2025-31933"
39+
40+
[vuln.providers.nvd.enrichment]
41+
reason = "Added CPE configurations because not yet analyzed by NVD."
42+
43+
[[vuln.providers.nvd.products.override.cve5]]
44+
vendor = "Growatt"
45+
product = "Cloud portal"
46+
[[vuln.providers.nvd.products.override.cve5.cpe]]
47+
vendor = "growatt"
48+
product = "cloud_portal"
49+
[[vuln.providers.nvd.products.override.cve5.affected]]
50+
[vuln.providers.nvd.products.override.cve5.affected.version]
51+
scheme = "custom"
52+
greater_than_or_equal = "0"
53+
less_than = "3.6.0"
54+
[[vuln.providers.nvd.products.override.cve5.affected.remediation]]
55+
version = "3.6.0"
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
[schema]
2+
version = "0.1.0"
3+
4+
[snapshot]
5+
captured = 2025-11-13T16:22:46.697829Z
6+
[[snapshot.cve5]]
7+
id = "CVE-2025-31949"
8+
published = 2025-04-15T20:19:24.914000Z
9+
reserved = 2025-04-01T17:44:07.313000Z
10+
updated = 2025-04-15T20:34:48.685000Z
11+
12+
[snapshot.cve5.digest]
13+
xxh128 = "fabd8b4e5907efebef343154603765e8"
14+
15+
[snapshot.cve5.overview]
16+
urls = ["https://nvd.nist.gov/vuln/detail/CVE-2025-31949"]
17+
cna = "icscert"
18+
description = """An authenticated attacker can obtain any plant name by knowing the plant ID."""
19+
references = [
20+
"https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04",
21+
]
22+
remediations = [
23+
"Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:\n\n * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.)\n * Use strong passwords and enable multi-factor authentication where applicable.\n * Report any security concerns to [email protected].\n * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity.",
24+
]
25+
[[snapshot.nvd]]
26+
id = "CVE-2025-31949"
27+
published = 2025-04-15T21:16:04.337000
28+
updated = 2025-04-16T13:25:37.340000
29+
30+
31+
[curator]
32+
converted_from_cve5 = true
33+
34+
[vuln]
35+
id = "ANCHORE-2025-14644"
36+
37+
[[vuln.providers.nvd]]
38+
id = "CVE-2025-31949"
39+
40+
[vuln.providers.nvd.enrichment]
41+
reason = "Added CPE configurations because not yet analyzed by NVD."
42+
43+
[[vuln.providers.nvd.products.override.cve5]]
44+
vendor = "Growatt"
45+
product = "Cloud portal"
46+
[[vuln.providers.nvd.products.override.cve5.cpe]]
47+
vendor = "growatt"
48+
product = "cloud_portal"
49+
[[vuln.providers.nvd.products.override.cve5.affected]]
50+
[vuln.providers.nvd.products.override.cve5.affected.version]
51+
scheme = "custom"
52+
greater_than_or_equal = "0"
53+
less_than_or_equal = "3.6.0"
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
[schema]
2+
version = "0.1.0"
3+
4+
[snapshot]
5+
captured = 2025-11-13T16:22:46.412926Z
6+
[[snapshot.cve5]]
7+
id = "CVE-2025-31357"
8+
published = 2025-04-15T20:21:34.076000Z
9+
reserved = 2025-04-01T17:44:07.303000Z
10+
updated = 2025-04-16T15:10:30.625000Z
11+
12+
[snapshot.cve5.digest]
13+
xxh128 = "fabd8b4e5907efebef343154603765e8"
14+
15+
[snapshot.cve5.overview]
16+
urls = ["https://nvd.nist.gov/vuln/detail/CVE-2025-31357"]
17+
cna = "icscert"
18+
description = """An unauthenticated attacker can obtain a user's plant list by knowing the username."""
19+
references = [
20+
"https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04",
21+
]
22+
remediations = [
23+
"Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:\n\n * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.)\n * Use strong passwords and enable multi-factor authentication where applicable.\n * Report any security concerns to [email protected].\n * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity.",
24+
]
25+
[[snapshot.nvd]]
26+
id = "CVE-2025-31357"
27+
published = 2025-04-15T21:16:03.737000
28+
updated = 2025-04-16T13:25:37.340000
29+
30+
31+
[curator]
32+
converted_from_cve5 = true
33+
34+
[vuln]
35+
id = "ANCHORE-2025-14646"
36+
37+
[[vuln.providers.nvd]]
38+
id = "CVE-2025-31357"
39+
40+
[vuln.providers.nvd.enrichment]
41+
reason = "Added CPE configurations because not yet analyzed by NVD."
42+
43+
[[vuln.providers.nvd.products.override.cve5]]
44+
vendor = "Growatt"
45+
product = "Cloud portal"
46+
[[vuln.providers.nvd.products.override.cve5.cpe]]
47+
vendor = "growatt"
48+
product = "cloud_portal"
49+
[[vuln.providers.nvd.products.override.cve5.affected]]
50+
[vuln.providers.nvd.products.override.cve5.affected.version]
51+
scheme = "custom"
52+
greater_than_or_equal = "0"
53+
less_than_or_equal = "3.6.0"
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
[schema]
2+
version = "0.1.0"
3+
4+
[snapshot]
5+
captured = 2025-11-13T16:22:46.005638Z
6+
[[snapshot.cve5]]
7+
id = "CVE-2025-31941"
8+
published = 2025-04-15T20:28:53.866000Z
9+
reserved = 2025-04-01T17:44:07.295000Z
10+
updated = 2025-04-16T15:10:22.745000Z
11+
12+
[snapshot.cve5.digest]
13+
xxh128 = "3e60fd753e23fe8c25dcbc5cf0fa182a"
14+
15+
[snapshot.cve5.overview]
16+
urls = ["https://nvd.nist.gov/vuln/detail/CVE-2025-31941"]
17+
cna = "icscert"
18+
description = """An unauthenticated attacker can obtain a list of smart devices by knowing a valid username."""
19+
references = [
20+
"https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04",
21+
]
22+
remediations = [
23+
"Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:\n\n * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.)\n * Use strong passwords and enable multi-factor authentication where applicable.\n * Report any security concerns to [email protected].\n * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity.",
24+
]
25+
[[snapshot.nvd]]
26+
id = "CVE-2025-31941"
27+
published = 2025-04-15T21:16:04.200000
28+
updated = 2025-04-16T13:25:37.340000
29+
30+
31+
[curator]
32+
converted_from_cve5 = true
33+
34+
[vuln]
35+
id = "ANCHORE-2025-14647"
36+
37+
[[vuln.providers.nvd]]
38+
id = "CVE-2025-31941"
39+
40+
[vuln.providers.nvd.enrichment]
41+
reason = "Added CPE configurations because not yet analyzed by NVD."
42+
43+
[[vuln.providers.nvd.products.override.cve5]]
44+
vendor = "Growatt"
45+
product = "Cloud portal"
46+
[[vuln.providers.nvd.products.override.cve5.cpe]]
47+
vendor = "growatt"
48+
product = "cloud_portal"
49+
[[vuln.providers.nvd.products.override.cve5.affected]]
50+
[vuln.providers.nvd.products.override.cve5.affected.version]
51+
scheme = "custom"
52+
greater_than_or_equal = "0"
53+
less_than = "3.6.0"
54+
[[vuln.providers.nvd.products.override.cve5.affected.remediation]]
55+
version = "3.6.0"
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
[schema]
2+
version = "0.1.0"
3+
4+
[snapshot]
5+
captured = 2025-11-13T16:23:07.246909Z
6+
[[snapshot.cve5]]
7+
id = "CVE-2025-27719"
8+
published = 2025-04-15T21:09:29.425000Z
9+
reserved = 2025-04-01T17:32:00.733000Z
10+
updated = 2025-04-16T15:08:56.430000Z
11+
12+
[snapshot.cve5.digest]
13+
xxh128 = "3e60fd753e23fe8c25dcbc5cf0fa182a"
14+
15+
[snapshot.cve5.overview]
16+
urls = ["https://nvd.nist.gov/vuln/detail/CVE-2025-27719"]
17+
cna = "icscert"
18+
description = """Unauthenticated attackers can query an API endpoint and get device details."""
19+
references = [
20+
"https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04",
21+
]
22+
remediations = [
23+
"Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:\n\n * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.)\n * Use strong passwords and enable multi-factor authentication where applicable.\n * Report any security concerns to [email protected].\n * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity.",
24+
]
25+
[[snapshot.nvd]]
26+
id = "CVE-2025-27719"
27+
published = 2025-04-15T22:15:25.427000
28+
updated = 2025-04-16T13:25:37.340000
29+
30+
31+
[curator]
32+
converted_from_cve5 = true
33+
34+
[vuln]
35+
id = "ANCHORE-2025-14737"
36+
37+
[[vuln.providers.nvd]]
38+
id = "CVE-2025-27719"
39+
40+
[vuln.providers.nvd.enrichment]
41+
reason = "Added CPE configurations because not yet analyzed by NVD."
42+
43+
[[vuln.providers.nvd.products.override.cve5]]
44+
vendor = "Growatt"
45+
product = "Cloud portal"
46+
[[vuln.providers.nvd.products.override.cve5.cpe]]
47+
vendor = "growatt"
48+
product = "cloud_portal"
49+
[[vuln.providers.nvd.products.override.cve5.affected]]
50+
[vuln.providers.nvd.products.override.cve5.affected.version]
51+
scheme = "custom"
52+
greater_than_or_equal = "0"
53+
less_than = "3.6.0"
54+
[[vuln.providers.nvd.products.override.cve5.affected.remediation]]
55+
version = "3.6.0"
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
[schema]
2+
version = "0.1.0"
3+
4+
[snapshot]
5+
captured = 2025-11-13T16:23:10.739784Z
6+
[[snapshot.cve5]]
7+
id = "CVE-2025-26857"
8+
published = 2025-04-15T21:12:13.452000Z
9+
reserved = 2025-04-01T17:32:00.724000Z
10+
updated = 2025-04-16T15:08:48.134000Z
11+
12+
[snapshot.cve5.digest]
13+
xxh128 = "3e60fd753e23fe8c25dcbc5cf0fa182a"
14+
15+
[snapshot.cve5.overview]
16+
urls = ["https://nvd.nist.gov/vuln/detail/CVE-2025-26857"]
17+
cna = "icscert"
18+
description = """Unauthenticated attackers can rename arbitrary devices of arbitrary users (i.e., EV chargers)."""
19+
references = [
20+
"https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04",
21+
]
22+
remediations = [
23+
"Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:\n\n * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.)\n * Use strong passwords and enable multi-factor authentication where applicable.\n * Report any security concerns to [email protected].\n * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity.",
24+
]
25+
[[snapshot.nvd]]
26+
id = "CVE-2025-26857"
27+
published = 2025-04-15T22:15:17.360000
28+
updated = 2025-04-16T13:25:37.340000
29+
30+
31+
[curator]
32+
converted_from_cve5 = true
33+
34+
[vuln]
35+
id = "ANCHORE-2025-14738"
36+
37+
[[vuln.providers.nvd]]
38+
id = "CVE-2025-26857"
39+
40+
[vuln.providers.nvd.enrichment]
41+
reason = "Added CPE configurations because not yet analyzed by NVD."
42+
43+
[[vuln.providers.nvd.products.override.cve5]]
44+
vendor = "Growatt"
45+
product = "Cloud portal"
46+
[[vuln.providers.nvd.products.override.cve5.cpe]]
47+
vendor = "growatt"
48+
product = "cloud_portal"
49+
[[vuln.providers.nvd.products.override.cve5.affected]]
50+
[vuln.providers.nvd.products.override.cve5.affected.version]
51+
scheme = "custom"
52+
greater_than_or_equal = "0"
53+
less_than = "3.6.0"
54+
[[vuln.providers.nvd.products.override.cve5.affected.remediation]]
55+
version = "3.6.0"
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
[schema]
2+
version = "0.1.0"
3+
4+
[snapshot]
5+
captured = 2025-11-13T16:23:07.249961Z
6+
[[snapshot.cve5]]
7+
id = "CVE-2025-27575"
8+
published = 2025-04-15T21:18:15.913000Z
9+
reserved = 2025-04-01T17:32:00.691000Z
10+
updated = 2025-04-16T15:08:19.282000Z
11+
12+
[snapshot.cve5.digest]
13+
xxh128 = "3e60fd753e23fe8c25dcbc5cf0fa182a"
14+
15+
[snapshot.cve5.overview]
16+
urls = ["https://nvd.nist.gov/vuln/detail/CVE-2025-27575"]
17+
cna = "icscert"
18+
description = """An unauthenticated attacker can obtain EV charger version and firmware upgrading history by knowing the charger ID."""
19+
references = [
20+
"https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04",
21+
]
22+
remediations = [
23+
"Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:\n\n * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.)\n * Use strong passwords and enable multi-factor authentication where applicable.\n * Report any security concerns to [email protected].\n * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity.",
24+
]
25+
[[snapshot.nvd]]
26+
id = "CVE-2025-27575"
27+
published = 2025-04-15T22:15:20.013000
28+
updated = 2025-04-16T13:25:37.340000
29+
30+
31+
[curator]
32+
converted_from_cve5 = true
33+
34+
[vuln]
35+
id = "ANCHORE-2025-14741"
36+
37+
[[vuln.providers.nvd]]
38+
id = "CVE-2025-27575"
39+
40+
[vuln.providers.nvd.enrichment]
41+
reason = "Added CPE configurations because not yet analyzed by NVD."
42+
43+
[[vuln.providers.nvd.products.override.cve5]]
44+
vendor = "Growatt"
45+
product = "Cloud portal"
46+
[[vuln.providers.nvd.products.override.cve5.cpe]]
47+
vendor = "growatt"
48+
product = "cloud_portal"
49+
[[vuln.providers.nvd.products.override.cve5.affected]]
50+
[vuln.providers.nvd.products.override.cve5.affected.version]
51+
scheme = "custom"
52+
greater_than_or_equal = "0"
53+
less_than = "3.6.0"
54+
[[vuln.providers.nvd.products.override.cve5.affected.remediation]]
55+
version = "3.6.0"

0 commit comments

Comments
 (0)