Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23883 | Tigo Energy's Cloud Connect Advanced (CCA) device contains hard-coded credentials that allow unauthorized users to gain administrative access. This vulnerability enables attackers to escalate privileges and take full control of the device, potentially modifying system settings, disrupting solar energy production, and interfering with safety mechanisms. |
Solution
No solution given by the vendor.
Workaround
Tigo Energy is aware of these vulnerabilities and is actively working on a fix to address them. Visit Tigo Energy's Help Center https://support.tigoenergy.com/hc/en-us for more specific security recommendations.
Tue, 12 Aug 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tigo Energy
Tigo Energy cloud Connect Advanced |
|
| Vendors & Products |
Tigo Energy
Tigo Energy cloud Connect Advanced |
Wed, 06 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 Aug 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tigo Energy's Cloud Connect Advanced (CCA) device contains hard-coded credentials that allow unauthorized users to gain administrative access. This vulnerability enables attackers to escalate privileges and take full control of the device, potentially modifying system settings, disrupting solar energy production, and interfering with safety mechanisms. | |
| Title | Use of Hard-coded Credentials in Tigo Energy Cloud Connect Advanced | |
| Weaknesses | CWE-798 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-08-06T20:41:11.923Z
Reserved: 2025-07-17T15:43:59.428Z
Link: CVE-2025-7768
Updated: 2025-08-06T20:41:08.733Z
Status : Awaiting Analysis
Published: 2025-08-06T21:15:32.460
Modified: 2025-08-07T21:26:37.453
Link: CVE-2025-7768
No data.
OpenCVE Enrichment
Updated: 2025-08-12T07:49:26Z
EUVD