Authentication Bypass Vulnerability in Gardyn Products
CVE-2026-28766
9.2CRITICAL
Key Information:
Badges
๐พ Exploit Exists๐ก Public PoC
What is CVE-2026-28766?
A security flaw in Gardyn products allows unauthenticated access to sensitive endpoint information, exposing all user account data for registered users. This vulnerability presents a significant risk, as it enables potential attackers to retrieve personal information without the need for authentication, compromising user privacy and security.
Affected Version(s)
Cloud API 0 < 2.12.2026
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Score:
9.2
Severity:
CRITICAL
Confidentiality:
High
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Michael Groberman reported these vulnerabilities to CISA.
