Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65291: n/a

0
Unknown
VulnerabilityCVE-2025-65291cvecve-2025-65291
Published: Wed Dec 10 2025 (12/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Aqara Hub devices including Hub M2 4.3.6_0027, Hub M3 4.3.6_0025, Camera Hub G3 4.1.9_0027 fail to validate server certificates in TLS connections for discovery services and CoAP gateway communications, enabling man-in-the-middle attacks on device control and monitoring.

AI-Powered Analysis

AILast updated: 12/10/2025, 21:41:26 UTC

Technical Analysis

CVE-2025-65291 identifies a critical security vulnerability in Aqara Hub devices, specifically the Hub M2 (version 4.3.6_0027), Hub M3 (version 4.3.6_0025), and Camera Hub G3 (version 4.1.9_0027). These devices fail to properly validate TLS server certificates during communications related to discovery services and CoAP (Constrained Application Protocol) gateway interactions. TLS certificate validation is a fundamental security mechanism that ensures the authenticity of the server and protects against man-in-the-middle (MitM) attacks. The absence or improper implementation of this validation allows an attacker positioned on the network path to intercept, modify, or inject malicious commands or data between the hub and its backend services. This can lead to unauthorized control over the smart home devices connected to the hub, exposure of sensitive monitoring data such as video feeds or sensor information, and disruption of normal device operations. The vulnerability affects core communication protocols used by the hubs, increasing the attack surface. Although no known exploits have been reported in the wild as of the publication date, the flaw’s nature makes it a significant risk. The lack of a CVSS score suggests the need for an expert severity assessment. The vulnerability does not require user interaction but does require network access to intercept communications, which could be achieved via compromised local networks or malicious Wi-Fi hotspots. The affected Aqara devices are widely used in smart home environments, which are increasingly integrated into enterprise and residential settings, raising concerns about privacy and operational security.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality, integrity, and availability of smart home and IoT device communications. Organizations using Aqara hubs for building automation, security monitoring, or environmental controls could face unauthorized access or control of these systems. This could lead to privacy breaches through interception of camera feeds or sensor data, manipulation of device states causing operational disruptions, or use of compromised devices as pivot points for broader network attacks. The impact is particularly relevant for enterprises with smart office environments or managed residential properties. The vulnerability undermines trust in IoT device security and could have regulatory implications under GDPR if personal data is exposed. Additionally, the ability to perform MitM attacks without user interaction increases the risk of stealthy exploitation. The lack of patches at the time of disclosure means organizations must rely on network-level mitigations to reduce exposure. The threat also highlights the importance of secure IoT device management and network architecture in European contexts where smart home adoption is growing rapidly.

Mitigation Recommendations

1. Apply vendor-provided patches or firmware updates as soon as they become available to ensure proper TLS certificate validation is enforced. 2. Segment IoT devices and Aqara hubs on dedicated network segments or VLANs to limit exposure to untrusted networks and reduce the attack surface. 3. Implement network monitoring and anomaly detection focused on unusual CoAP or discovery service traffic patterns that could indicate MitM attempts. 4. Use network-level TLS inspection and certificate pinning where possible to detect invalid certificates during communications. 5. Restrict physical and wireless network access to prevent attackers from positioning themselves on the communication path. 6. Educate users and administrators about the risks of connecting IoT devices to unsecured or public networks. 7. Consider deploying additional endpoint security controls on devices interacting with Aqara hubs to detect suspicious activity. 8. Maintain an inventory of IoT devices and monitor for firmware versions to prioritize remediation efforts. 9. Engage with Aqara support channels to receive timely vulnerability notifications and mitigation guidance. 10. Evaluate alternative devices or vendors with stronger security postures if timely patching is not feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6939e5605ab76fdc5f2656f2

Added to database: 12/10/2025, 9:25:52 PM

Last enriched: 12/10/2025, 9:41:26 PM

Last updated: 12/11/2025, 3:52:35 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats