Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65297: n/a

0
High
VulnerabilityCVE-2025-65297cvecve-2025-65297
Published: Wed Dec 10 2025 (12/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Aqara Hub devices including Camera Hub G3 4.1.9_0027, Hub M2 4.3.6_0027, and Hub M3 4.3.6_0025 automatically collect and upload unencrypted sensitive information. Note that this occurs without disclosure or consent from the manufacturer.

AI-Powered Analysis

AILast updated: 12/17/2025, 23:14:53 UTC

Technical Analysis

CVE-2025-65297 identifies a vulnerability in several Aqara Hub devices—specifically Camera Hub G3 version 4.1.9_0027, Hub M2 version 4.3.6_0027, and Hub M3 version 4.3.6_0025—where these devices automatically collect and transmit sensitive information without encryption. This data collection and upload occur without disclosure or consent from the manufacturer, violating privacy expectations and potentially regulatory requirements. The vulnerability is classified under CWE-5 (Improper Restriction of Operations within the Bounds of a Memory Buffer), indicating a flaw related to handling sensitive data. The CVSS v3.1 score is 7.5 (high), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, meaning the attack can be performed remotely over the network without any privileges or user interaction, and it results in a complete loss of confidentiality. The lack of encryption means that attackers on the same network or with network access can intercept sensitive data in transit. The vulnerability does not affect integrity or availability directly but poses a serious privacy risk. No patches or updates have been linked yet, and no exploits are known in the wild. This vulnerability affects IoT devices commonly used in smart home environments, which may be integrated into enterprise or residential networks, increasing the attack surface. The automatic data upload without user consent also raises compliance concerns under data protection regulations such as GDPR.

Potential Impact

For European organizations, the primary impact is the exposure of sensitive information transmitted by Aqara Hub devices, which can include personal data, network information, or other confidential details. This exposure can lead to privacy violations, regulatory non-compliance (notably GDPR), and potential reputational damage. Organizations using these devices in office environments or employee residences for remote work may inadvertently expose internal network details or user data. The unencrypted transmission allows attackers with network access to perform passive eavesdropping attacks, potentially leading to targeted phishing or further exploitation. While the vulnerability does not directly compromise device integrity or availability, the confidentiality breach alone is significant, especially for sectors handling sensitive data such as finance, healthcare, and government. The lack of manufacturer disclosure and consent complicates risk management and incident response. Additionally, the presence of these devices in smart buildings or IoT-integrated infrastructures could provide attackers with reconnaissance information for broader attacks.

Mitigation Recommendations

1. Network Segmentation: Isolate Aqara Hub devices on separate VLANs or network segments to limit exposure to sensitive internal networks. 2. Enforce Network Encryption: Use VPNs or secure tunnels for all IoT device traffic to prevent interception of unencrypted data. 3. Monitor Network Traffic: Deploy IDS/IPS solutions to detect unusual data transmissions from Aqara devices, focusing on unencrypted uploads. 4. Disable Unnecessary Features: Where possible, disable automatic data collection or cloud upload features on affected devices. 5. Device Inventory and Risk Assessment: Identify all Aqara devices in the environment and assess their usage and data sensitivity. 6. Engage with Manufacturer: Request official patches or firmware updates addressing the vulnerability and demand transparency regarding data collection. 7. User Awareness: Inform users about the privacy risks and advise on safe usage practices, including avoiding these devices in sensitive environments. 8. Regulatory Compliance Review: Evaluate the impact of this vulnerability on GDPR and other privacy regulations, and prepare for potential reporting obligations. 9. Consider Alternative Devices: For critical environments, replace vulnerable Aqara devices with alternatives that ensure encrypted data transmission and user consent. 10. Apply Network Access Controls: Restrict device communication to only necessary endpoints and block unauthorized external connections.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6939efe25ab76fdc5f31bfb2

Added to database: 12/10/2025, 10:10:42 PM

Last enriched: 12/17/2025, 11:14:53 PM

Last updated: 2/4/2026, 6:11:01 PM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats