CVE-2025-1242 PUBLISHED

Administrative Credentials Can Be Extracted Through Gardyn API Responses

Assigner: icscert
Reserved: 11.02.2025 Published: 25.02.2026 Updated: 25.02.2026

The administrative credentials can be extracted through application API responses, mobile application reverse engineering, and device firmware reverse engineering. The exposure may result in an attacker gaining full administrative access to the Gardyn IoT Hub exposing connected devices to malicious control.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor Gardyn
Product Home Kit
Versions Default: unaffected
  • affected from 0 to master.619 (excl.)
Vendor Gardyn
Product Home Kit Mobile Application
Versions Default: unaffected
  • affected from 0 to 2.11.0 (excl.)
Vendor Gardyn
Product Home Kit Cloud API
Versions Default: unaffected
  • affected from 0 to 2.12.2026 (excl.)

Solutions

Further customer support can be obtained from Gardyn at: support@mygardyn.com

Credits

  • Michael Groberman reported this vulnerability to CISA. finder

References

Problem Types

  • CWE-798 Use of Hard-coded Credentials CWE