Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36753: CWE-290 Authentication Bypass by Spoofing in Growatt ShineLan-X

0
High
VulnerabilityCVE-2025-36753cvecve-2025-36753cwe-290
Published: Sat Dec 13 2025 (12/13/2025, 08:16:22 UTC)
Source: CVE Database V5
Vendor/Project: Growatt
Product: ShineLan-X

Description

The SWD debug interface on the Growatt ShineLan-X communication dongle is available by default, allowing an attacker to attain debug access to the device and to extracting secrets or domains from within the device

AI-Powered Analysis

AILast updated: 12/20/2025, 09:03:40 UTC

Technical Analysis

CVE-2025-36753 is an authentication bypass vulnerability classified under CWE-290 affecting the Growatt ShineLan-X communication dongle, specifically version 3.6.0.0. The root cause is that the Serial Wire Debug (SWD) interface, which is intended for development and debugging purposes, is enabled and accessible by default on the device. This interface allows direct low-level access to the device's internals without requiring authentication or user interaction. An attacker with physical or network proximity to the device can connect to the SWD interface and gain debug access. This access enables extraction of sensitive information such as cryptographic secrets, configuration domains, or other protected data stored within the device. The vulnerability's CVSS 4.0 score is 8.6, reflecting a high severity due to the ease of exploitation (no privileges or user interaction needed), and the high impact on confidentiality, integrity, and availability. The vulnerability could facilitate further attacks on the solar energy infrastructure managed by these devices, including manipulation of device operation or data exfiltration. No patches or firmware updates are currently listed, and no exploits have been reported in the wild. The vulnerability was reserved in April 2025 and published in December 2025 by DIVD, indicating recent discovery and disclosure.

Potential Impact

For European organizations, especially those involved in renewable energy production and management, this vulnerability poses a significant risk. Growatt ShineLan-X dongles are used to communicate with solar inverters and energy management systems, making them critical components in energy infrastructure. Exploitation could lead to unauthorized access to device secrets, enabling attackers to manipulate energy production data, disrupt operations, or pivot to other parts of the network. Confidentiality breaches could expose sensitive operational data or credentials, while integrity attacks could alter device behavior, potentially causing energy mismanagement or outages. Availability could also be impacted if attackers disable or corrupt device functionality. The risk is heightened in countries with substantial solar energy deployment using Growatt products, as well as in critical infrastructure sectors where energy reliability is paramount.

Mitigation Recommendations

Immediate mitigation steps include physically securing devices to prevent unauthorized access to the SWD interface. Organizations should verify if the SWD debug interface can be disabled or access-restricted via device configuration or firmware updates. If possible, update to a patched firmware version once available from Growatt. Network segmentation should be enforced to isolate these devices from broader enterprise networks, limiting attacker lateral movement. Monitoring and logging of device communications can help detect anomalous access attempts. Additionally, organizations should engage with Growatt support to obtain guidance and request timely patches. For new deployments, ensure that debug interfaces are disabled by default and that secure device provisioning processes are followed. Regular security audits of IoT and OT devices in energy environments are recommended to identify similar risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
DIVD
Date Reserved
2025-04-15T21:54:36.815Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693d2747f35c2264d84722f9

Added to database: 12/13/2025, 8:43:51 AM

Last enriched: 12/20/2025, 9:03:40 AM

Last updated: 2/7/2026, 10:01:32 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats