Impact
Hard‑coded credentials embedded in the Gardyn mobile application and Home device firmware create a weakness that permits unauthorized authentication to Gardyn services, enabling attackers to access production storage containers. Because the credentials do not limit permissions, are not tied to a specific user, and lack an expiration policy, they expose the system to potential data theft, tampering, or service disruption.
Affected Systems
The flaw impacts Gardyn’s Cloud API, the Gardyn mobile application, and the firmware of Gardyn Home devices. Users are advised to upgrade to the latest mobile app version and to apply firmware version master.622 or newer on all home kits and studio devices.
Risk and Exploitability
With a CVSS score of 8.8, the vulnerability is rated high severity. The EPSS score is not provided and the issue is not listed in CISA’s KEV catalog, but the persistent, non‑expiring credentials increase long‑term risk. Based on the description, it is inferred that attackers could extract the credentials from the mobile app or firmware and use them remotely to reach storage containers, provided the device maintains network connectivity. The official workaround is to upgrade the software; failure to do so keeps systems exposed to unauthorized access.
OpenCVE Enrichment