Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Tigo Energy is aware of these vulnerabilities and is actively working on a fix to address them. Visit Tigo Energy's Help Center https://support.tigoenergy.com/hc/en-us for more specific security recommendations.
Tue, 12 Aug 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tigo Energy
Tigo Energy cloud Connect Advanced |
|
Vendors & Products |
Tigo Energy
Tigo Energy cloud Connect Advanced |
Wed, 06 Aug 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 06 Aug 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Tigo Energy's Cloud Connect Advanced (CCA) device contains hard-coded credentials that allow unauthorized users to gain administrative access. This vulnerability enables attackers to escalate privileges and take full control of the device, potentially modifying system settings, disrupting solar energy production, and interfering with safety mechanisms. | |
Title | Use of Hard-coded Credentials in Tigo Energy Cloud Connect Advanced | |
Weaknesses | CWE-798 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-08-06T20:41:11.923Z
Reserved: 2025-07-17T15:43:59.428Z
Link: CVE-2025-7768

Updated: 2025-08-06T20:41:08.733Z

Status : Awaiting Analysis
Published: 2025-08-06T21:15:32.460
Modified: 2025-08-07T21:26:37.453
Link: CVE-2025-7768

No data.

Updated: 2025-08-12T07:49:26Z