We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Tigo Energy's CCA device is vulnerable to insecure session ID generation in their remote API. The session IDs are generated using a predictable method based on the current timestamp, allowing attackers to recreate valid session IDs. When combined with the ability to circumvent session ID requirements for certain commands, this enables unauthorized access to sensitive device functions on connected solar optimization systems.
Reserved 2025-07-17 | Published 2025-08-06 | Updated 2025-08-06 | Assigner icscertCWE-337 Predictable Seed in Pseudo-Random Number Generator (PRNG)
Anthony Rose of BC Security
Jacob Krasnov of BC Security
Peter Kariuki of Ovanova
www.cisa.gov/news-events/ics-advisories/icsa-25-217-02
Support options