CVE-2025-29628

A Gardyn Azure IoT Hub connection string is downloaded over an insecure HTTP connection in Gardyn Home Kit firmware before master.619, Home Kit Mobile Application before 2.11.0, and Home Kit Cloud API before 2.12.2026 leaving the string vulnerable to interception and modification through a Man-in-the-Middle attack. This may result in the attacker capturing device credentials or taking control of vulnerable home kits.
Configurations

No configuration.

History

25 Feb 2026, 21:16

Type Values Removed Values Added
References
  • {'url': 'http://gardyn.com', 'source': 'cve@mitre.org'}

25 Feb 2026, 17:25

Type Values Removed Values Added
Summary (en) An issue in Gardyn 4 allows a remote attacker to obtain sensitive information and execute arbitrary code via a request (en) A Gardyn Azure IoT Hub connection string is downloaded over an insecure HTTP connection in Gardyn Home Kit firmware before master.619, Home Kit Mobile Application before 2.11.0, and Home Kit Cloud API before 2.12.2026 leaving the string vulnerable to interception and modification through a Man-in-the-Middle attack. This may result in the attacker capturing device credentials or taking control of vulnerable home kits.
CVSS v2 : unknown
v3 : 8.3
v2 : unknown
v3 : 9.4
References
  • () https://mygardyn.com/blog/security-update/ -
  • () https://www.cisa.gov/news-events/ics-advisories/icsa-26-055-03 -

25 Feb 2026, 08:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.1
v2 : unknown
v3 : 8.3
CWE CWE-924

29 Jul 2025, 14:14

Type Values Removed Values Added
Summary
  • (es) Un problema en Gardyn 4 permite que un atacante remoto obtenga información confidencial y ejecute código arbitrario a través de una solicitud.

25 Jul 2025, 21:15

Type Values Removed Values Added
CWE CWE-77
CWE-200
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1

25 Jul 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-25 17:15

Updated : 2026-02-25 21:16


NVD link : CVE-2025-29628

Mitre link : CVE-2025-29628

CVE.ORG link : CVE-2025-29628


JSON object : View

Products Affected

No product.

CWE
CWE-924

Improper Enforcement of Message Integrity During Transmission in a Communication Channel

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor