Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65290: n/a

0
Unknown
VulnerabilityCVE-2025-65290cvecve-2025-65290
Published: Wed Dec 10 2025 (12/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Aqara Hub devices including Camera Hub G3 4.1.9_0027, Hub M2 4.3.6_0027, and Hub M3 4.3.6_0025 fail to validate server certificates during HTTPS firmware downloads, allowing man-in-the-middle attackers to intercept firmware update traffic and potentially serve modified firmware files.

AI-Powered Analysis

AILast updated: 12/10/2025, 21:41:46 UTC

Technical Analysis

CVE-2025-65290 is a vulnerability found in several Aqara Hub devices, specifically the Camera Hub G3 version 4.1.9_0027, Hub M2 version 4.3.6_0027, and Hub M3 version 4.3.6_0025. These devices fail to properly validate server certificates during HTTPS firmware downloads, which is a critical step in ensuring the authenticity and integrity of firmware updates. Without certificate validation, an attacker capable of performing a man-in-the-middle (MitM) attack can intercept the firmware update process and serve malicious firmware to the device. This could lead to unauthorized control over the device, data exfiltration, or disruption of device functionality. The vulnerability does not require user interaction but does require the attacker to be able to intercept network traffic, which could be achieved in local networks or via compromised routers or ISPs. The lack of a CVSS score indicates this is a newly published vulnerability with no known exploits in the wild yet, but the technical impact is significant given the role of firmware in device security. Aqara Hubs are commonly used in smart home and building automation environments, making this vulnerability a concern for environments relying on these devices for security or operational functions. The absence of patch links suggests that fixes may not yet be available, emphasizing the need for immediate mitigation strategies.

Potential Impact

The impact of CVE-2025-65290 on European organizations could be substantial, particularly for those deploying Aqara Hub devices in smart homes, offices, or critical infrastructure environments. Compromise of these hubs could lead to unauthorized surveillance, data breaches, or disruption of automated systems controlling physical security or environmental controls. The integrity and availability of these devices are at risk, potentially allowing attackers to persist within networks or pivot to other systems. Confidentiality is also threatened if attackers gain access to camera feeds or sensor data. The vulnerability could undermine trust in IoT deployments and increase operational risks. Organizations in sectors such as energy, manufacturing, and government that adopt smart building technologies may face elevated risks. Additionally, the potential for firmware manipulation could facilitate further malware installation or lateral movement within networks, escalating the threat beyond the initial device compromise.

Mitigation Recommendations

To mitigate CVE-2025-65290, organizations should first monitor vendor communications for official firmware updates that address certificate validation. Until patches are available, network segmentation should be implemented to isolate Aqara Hub devices from sensitive network segments. Employing network-level protections such as TLS interception detection, anomaly-based intrusion detection systems, and strict firewall rules can help detect or prevent MitM attempts. Organizations should also audit device configurations and restrict physical and network access to trusted personnel. Where possible, deploying network encryption and VPNs can reduce exposure to interception. Regularly reviewing device logs for unusual firmware update activity or unexpected reboots can aid early detection. Finally, organizations should consider alternative devices with stronger security postures if timely patches are not forthcoming.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6939e5605ab76fdc5f2656ef

Added to database: 12/10/2025, 9:25:52 PM

Last enriched: 12/10/2025, 9:41:46 PM

Last updated: 12/11/2025, 6:33:10 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats