IoT Hub Vulnerability in Gardyn Products Exposes Administrative Credentials
CVE-2025-1242

9.3CRITICAL

Key Information:

Vendor

Gardyn

Vendor
CVE Published:
25 February 2026

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

What is CVE-2025-1242?

The Gardyn IoT Hub exhibits a vulnerability where administrative credentials can be extracted via its application API responses, reverse engineering of the mobile application, and the device's firmware. This flaw may grant an attacker full administrative access to the IoT Hub, consequently putting connected devices at risk of malicious control. Ensuring robust security measures and regular updates is critical to mitigate such risks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Home Kit 0

Home Kit Cloud API 0 0 < 2.12.2026

Home Kit Mobile Application 0 < 2.11.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Michael Groberman reported this vulnerability to CISA.
.