CVE-2025-29628

A Gardyn Azure IoT Hub connection string is downloaded over an insecure HTTP connection in Gardyn Home Kit firmware before master.619, Home Kit Mobile Application before 2.11.0, and Home Kit Cloud API before 2.12.2026 leaving the string vulnerable to interception and modification through a Man-in-the-Middle attack. This may result in the attacker capturing device credentials or taking control of vulnerable home kits.
Configurations

No configuration.

History

No history.

Information

Published : 2025-07-25 17:15

Updated : 2026-02-25 21:16


NVD link : CVE-2025-29628

Mitre link : CVE-2025-29628

CVE.ORG link : CVE-2025-29628


JSON object : View

Products Affected

No product.

CWE
CWE-924

Improper Enforcement of Message Integrity During Transmission in a Communication Channel

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor