Gardyn Home Kit
Gardyn Home Kit firmware, mobile application, and cloud API contain multiple vulnerabilities that allow unauthenticated attackers to access and control edge devices, extract user and device information from the cloud, and pivot between devices in the Gardyn environment. Affected products include Home Kit Firmware below master.619, Mobile Application below version 2.11.0, and Cloud API below version 2.12.2026. The vulnerabilities include cleartext communications (CWE-319), hardcoded credentials (CWE-1392), OS command injection (CWE-78), and embedded plaintext secrets (CWE-798).
- Internet-facing Gardyn Home Kit or Cloud API access
- No authentication credentials required
- Device running vulnerable firmware version below master.619
- Mobile app version below 2.11.0
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0af293a7-3613-40cd-93d3-4a339a7d0efcGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.