Description
Development and test API endpoints are present that mirror production functionality.
Published: 2026-04-03
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized privileged access via exposed debug API
Action: Apply Update
AI Analysis

Impact

Development and test API endpoints that duplicate production functionality remain active in the Gardyn Cloud API. These debug interfaces provide privileged operations that can be invoked without proper authorization, potentially allowing an attacker to perform actions such as configuration changes or data retrieval that are normally restricted to authenticated users. The vulnerability is classified as CWE‑489, indicating insecure direct object reference. Although the description does not specify code execution, the exposed endpoints could lead to unauthorized manipulation of Gardyn devices and services.

Affected Systems

The vulnerability affects the Gardyn Cloud API, the Gardyn mobile application, and the Gardyn Home firmware. Devices running any mobile app version prior to the latest release or firmware versions earlier than master.622 are potentially vulnerable. Gardyn recommends that users install the latest mobile application and upgrade home kit and studio devices to firmware master.622 or later to eliminate the exposed endpoints.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, and the vulnerability is not listed in the CISA KEV catalog. Attackers would likely target the internet‑reachable API endpoints from external networks, assuming the device has network connectivity. The lack of a required authentication requirement in the description suggests that an unauthenticated attacker could exploit the debug API if it is publicly reachable, leading to unauthorized control or data exposure on affected Gardyn devices. Because EPSS data is unavailable, the precise likelihood of exploitation cannot be quantified, but the presence of exposed debug functionality raises a clear risk to device security.

Generated by OpenCVE AI on April 3, 2026 at 22:51 UTC.

Remediation

Vendor Solution

Gardyn states that the relevant fixes are included in the latest version of the Gardyn mobile application. Users are required to run a supported version of the Gardyn App on their phone in order to access Gardyn services and devices. The current versions of the Gardyn App and the Gardyn Home firmware can be checked in the Gardyn App. For all vulnerabilities, Gardyn recommends users ensure their home kit and studio devices are upgraded to firmware master.622 or later. Gardyn also recommends that users update their mobile application to the most recent version. Gardyn requests that users ensure their devices have network connectivity in order to automatically download needed firmware updates. Unconnected devices will automatically update when configured with a working Internet connection.


OpenCVE Recommended Actions

  • Update the Gardyn mobile application to the latest version
  • Upgrade Gardyn Home firmware to version master.622 or later
  • Ensure all Gardyn devices maintain internet connectivity for automatic firmware updates
  • Verify that devices operate on secure, authenticated network connections
  • Contact Gardyn support if updates cannot be applied

Generated by OpenCVE AI on April 3, 2026 at 22:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Mygardyn
Mygardyn cloud Api
CPEs cpe:2.3:a:mygardyn:cloud_api:*:*:*:*:*:*:*:*
Vendors & Products Mygardyn
Mygardyn cloud Api

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Gardyn
Gardyn cloud Api
Vendors & Products Gardyn
Gardyn cloud Api

Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Description Development and test API endpoints are present that mirror production functionality.
Title Gardyn Cloud API Active Debug Code
Weaknesses CWE-489
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Gardyn Cloud Api
Mygardyn Cloud Api
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-04-06T14:51:59.384Z

Reserved: 2026-03-17T20:12:55.193Z

Link: CVE-2026-32662

cve-icon Vulnrichment

Updated: 2026-04-06T14:51:22.050Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-03T21:17:11.323

Modified: 2026-04-22T18:07:02.343

Link: CVE-2026-32662

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T07:16:39Z

Weaknesses