CVE-2025-56558: CWE-420 Unprotected Alternate Channel in Dyson MQTT server
The Dyson MQTT server (2022 and possibly later) allows publications and subscriptions by a client that has the correct values of AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, AWS_SESSION_TOKEN, and device serial number, even if a device (such as a Pure Hot+Cool device) has been removed and is not visible in the supported MyDyson app. This could allow an unexpected actor to obtain control and set the room temperature (up to 37 Celsius) if ownership of the device is transferred without wiping the device. NOTE: the Supplier's position is that this is a potential vulnerability that dates back 4 years ago in 2022 and "we are unable to replicate that anymore." Based on the submitted report, in order to leverage this issue, an attacker needs to own a Dyson device with full privileges, sniff for the AWS credentials, and then transfer ownership of that Dyson device to the victim. Even if these steps were successfully accomplished, the attacker only acquires the ability to configure the Dyson device within its safe operating range, and does not acquire the ability to execute code on the device or obtain sensitive information.
AI Analysis
Technical Summary
CVE-2025-56558 identifies a vulnerability categorized under CWE-420 (Unprotected Alternate Channel) in the Dyson MQTT server version 2022. The MQTT server facilitates communication between Dyson smart devices and clients via AWS credentials (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, AWS_SESSION_TOKEN) and device serial numbers. The vulnerability arises because the server permits clients with valid AWS credentials and device serial numbers to publish and subscribe to MQTT topics for devices that have been removed from the MyDyson app, effectively bypassing expected device ownership controls. This flaw could allow an attacker who owns a Dyson device with full privileges to intercept AWS credentials (e.g., via network sniffing) and then transfer ownership of that device to a victim without wiping it. Consequently, the attacker can manipulate device settings such as room temperature (up to 37 Celsius) but cannot execute arbitrary code on the device or access sensitive information. The vendor reports inability to replicate the issue currently, indicating possible remediation or environmental factors limiting exploitation. The CVSS v3.1 score is 3.0 (low), reflecting the requirement for high privileges, network attack vector, and limited impact on integrity without affecting confidentiality or availability. No patches are currently linked, and no known exploits have been observed in the wild. This vulnerability primarily impacts the integrity of device configuration within a constrained operational scope.
Potential Impact
For European organizations, the impact of CVE-2025-56558 is generally low but context-dependent. Organizations using Dyson smart devices, particularly Pure Hot+Cool models integrated into office or home environments, could face unauthorized manipulation of device settings if an attacker gains privileged access to AWS credentials and device serial numbers. This could lead to minor disruptions such as inappropriate room temperatures, potentially affecting comfort or operational conditions. However, the vulnerability does not allow code execution or data exfiltration, limiting risks to confidentiality and availability. The requirement for device ownership and credential interception significantly reduces the attack surface. Nonetheless, organizations with high security standards or critical environments should consider this vulnerability as a potential vector for low-impact integrity attacks. The lack of known exploits and vendor inability to reproduce the issue suggest limited practical risk, but vigilance is advised where Dyson devices are deployed at scale or in sensitive settings.
Mitigation Recommendations
To mitigate CVE-2025-56558, European organizations should implement the following specific measures: 1) Enforce strict device hygiene by ensuring that any Dyson device ownership transfer includes a complete factory reset or wipe to remove residual credentials and data. 2) Monitor and restrict access to AWS credentials associated with Dyson devices, employing network segmentation and encryption to prevent credential interception. 3) Update Dyson device firmware and server software to the latest versions, as vendor updates may have addressed this vulnerability or improved security controls. 4) Employ network monitoring tools to detect anomalous MQTT traffic patterns indicative of unauthorized publish/subscribe activity. 5) Limit the use of Dyson smart devices in critical or sensitive environments where unauthorized configuration changes could have operational impacts. 6) Educate users and administrators on the importance of secure credential management and device ownership protocols. 7) Engage with Dyson support or security advisories for any forthcoming patches or mitigations. These targeted actions go beyond generic advice by focusing on credential protection, device lifecycle management, and network monitoring specific to the Dyson MQTT ecosystem.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Denmark
CVE-2025-56558: CWE-420 Unprotected Alternate Channel in Dyson MQTT server
Description
The Dyson MQTT server (2022 and possibly later) allows publications and subscriptions by a client that has the correct values of AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, AWS_SESSION_TOKEN, and device serial number, even if a device (such as a Pure Hot+Cool device) has been removed and is not visible in the supported MyDyson app. This could allow an unexpected actor to obtain control and set the room temperature (up to 37 Celsius) if ownership of the device is transferred without wiping the device. NOTE: the Supplier's position is that this is a potential vulnerability that dates back 4 years ago in 2022 and "we are unable to replicate that anymore." Based on the submitted report, in order to leverage this issue, an attacker needs to own a Dyson device with full privileges, sniff for the AWS credentials, and then transfer ownership of that Dyson device to the victim. Even if these steps were successfully accomplished, the attacker only acquires the ability to configure the Dyson device within its safe operating range, and does not acquire the ability to execute code on the device or obtain sensitive information.
AI-Powered Analysis
Technical Analysis
CVE-2025-56558 identifies a vulnerability categorized under CWE-420 (Unprotected Alternate Channel) in the Dyson MQTT server version 2022. The MQTT server facilitates communication between Dyson smart devices and clients via AWS credentials (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, AWS_SESSION_TOKEN) and device serial numbers. The vulnerability arises because the server permits clients with valid AWS credentials and device serial numbers to publish and subscribe to MQTT topics for devices that have been removed from the MyDyson app, effectively bypassing expected device ownership controls. This flaw could allow an attacker who owns a Dyson device with full privileges to intercept AWS credentials (e.g., via network sniffing) and then transfer ownership of that device to a victim without wiping it. Consequently, the attacker can manipulate device settings such as room temperature (up to 37 Celsius) but cannot execute arbitrary code on the device or access sensitive information. The vendor reports inability to replicate the issue currently, indicating possible remediation or environmental factors limiting exploitation. The CVSS v3.1 score is 3.0 (low), reflecting the requirement for high privileges, network attack vector, and limited impact on integrity without affecting confidentiality or availability. No patches are currently linked, and no known exploits have been observed in the wild. This vulnerability primarily impacts the integrity of device configuration within a constrained operational scope.
Potential Impact
For European organizations, the impact of CVE-2025-56558 is generally low but context-dependent. Organizations using Dyson smart devices, particularly Pure Hot+Cool models integrated into office or home environments, could face unauthorized manipulation of device settings if an attacker gains privileged access to AWS credentials and device serial numbers. This could lead to minor disruptions such as inappropriate room temperatures, potentially affecting comfort or operational conditions. However, the vulnerability does not allow code execution or data exfiltration, limiting risks to confidentiality and availability. The requirement for device ownership and credential interception significantly reduces the attack surface. Nonetheless, organizations with high security standards or critical environments should consider this vulnerability as a potential vector for low-impact integrity attacks. The lack of known exploits and vendor inability to reproduce the issue suggest limited practical risk, but vigilance is advised where Dyson devices are deployed at scale or in sensitive settings.
Mitigation Recommendations
To mitigate CVE-2025-56558, European organizations should implement the following specific measures: 1) Enforce strict device hygiene by ensuring that any Dyson device ownership transfer includes a complete factory reset or wipe to remove residual credentials and data. 2) Monitor and restrict access to AWS credentials associated with Dyson devices, employing network segmentation and encryption to prevent credential interception. 3) Update Dyson device firmware and server software to the latest versions, as vendor updates may have addressed this vulnerability or improved security controls. 4) Employ network monitoring tools to detect anomalous MQTT traffic patterns indicative of unauthorized publish/subscribe activity. 5) Limit the use of Dyson smart devices in critical or sensitive environments where unauthorized configuration changes could have operational impacts. 6) Educate users and administrators on the importance of secure credential management and device ownership protocols. 7) Engage with Dyson support or security advisories for any forthcoming patches or mitigations. These targeted actions go beyond generic advice by focusing on credential protection, device lifecycle management, and network monitoring specific to the Dyson MQTT ecosystem.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-17T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69024872c461420f24c8f55a
Added to database: 10/29/2025, 5:01:38 PM
Last enriched: 1/15/2026, 9:51:21 PM
Last updated: 2/7/2026, 8:35:05 AM
Views: 143
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2078: Improper Authorization in yeqifu warehouse
MediumCVE-2026-25533: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in agentfront enclave
MediumCVE-2026-25123: CWE-918: Server-Side Request Forgery (SSRF) in homarr-labs homarr
MediumCVE-2025-68621: CWE-208: Observable Timing Discrepancy in TriliumNext Trilium
HighCVE-2026-2074: XML External Entity Reference in O2OA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.