CVE-2025-7768 PUBLISHED

Use of Hard-coded Credentials in Tigo Energy Cloud Connect Advanced

Assigner: icscert
Reserved: 17.07.2025 Published: 06.08.2025 Updated: 06.08.2025

Tigo Energy's Cloud Connect Advanced (CCA) device contains hard-coded credentials that allow unauthorized users to gain administrative access. This vulnerability enables attackers to escalate privileges and take full control of the device, potentially modifying system settings, disrupting solar energy production, and interfering with safety mechanisms.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor Tigo Energy
Product Cloud Connect Advanced
Versions Default: unaffected
  • affected from 0 to 4.0.1 (incl.)

Workarounds

Tigo Energy is aware of these vulnerabilities and is actively working on a fix to address them.

Visit Tigo Energy's Help Center https://support.tigoenergy.com/hc/en-us  for more specific security recommendations.

Credits

  • Anthony Rose and Jacob Krasnov of BC Security and Peter Kariuki of Ovanova reporter

References

Problem Types

  • CWE-798 Use of Hard-coded Credentials CWE