Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34205: CWE-923: Improper Restriction of Communication Channel to Intended Endpoints in home-assistant Home Assistant Operating System

0
Critical
VulnerabilityCVE-2026-34205cvecve-2026-34205cwe-923
Published: Fri Mar 27 2026 (03/27/2026, 19:41:10 UTC)
Source: CVE Database V5
Vendor/Project: home-assistant
Product: Home Assistant Operating System

Description

Home Assistant is open source home automation software that puts local control and privacy first. Home Assistant apps (formerly add-ons) configured with host network mode expose unauthenticated endpoints bound to the internal Docker bridge interface to the local network. On Linux, this configuration does not restrict access to the app as intended, allowing any device on the same network to reach these endpoints without authentication. Home Assistant Supervisor 2026.03.02 addresses the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 20:14:50 UTC

Technical Analysis

CVE-2026-34205 is a critical security vulnerability classified under CWE-923 (Improper Restriction of Communication Channel to Intended Endpoints) affecting the Home Assistant Operating System up to version 17.1. Home Assistant is an open-source platform for home automation that emphasizes local control and privacy. The vulnerability stems from the way Home Assistant apps (formerly add-ons) are configured when using host network mode. In this mode, apps expose unauthenticated service endpoints bound to the internal Docker bridge interface, which is intended to restrict access. However, on Linux systems, this configuration fails to enforce proper access controls, allowing any device on the same local network to reach these endpoints without requiring authentication. This flaw effectively exposes sensitive control interfaces to unauthorized local network actors. The exposed endpoints can be leveraged to manipulate home automation devices, potentially leading to unauthorized control, data leakage, or disruption of services. The vulnerability has a CVSS 3.1 base score of 9.7, indicating critical severity with high impact on confidentiality, integrity, and availability. Exploitation requires network access but no privileges or user interaction, increasing the risk in environments where network segmentation is weak or absent. The Home Assistant Supervisor 2026.03.02 release includes fixes to properly restrict access to these endpoints, mitigating the vulnerability. No public exploits have been reported yet, but the vulnerability's nature makes it a high-value target for attackers seeking to compromise IoT and smart home environments.

Potential Impact

The impact of CVE-2026-34205 is significant for organizations and individuals using Home Assistant Operating System in their smart home or IoT deployments. Unauthorized access to unauthenticated endpoints can lead to full compromise of home automation controls, enabling attackers to manipulate devices, exfiltrate sensitive data, or disrupt operations. This can result in privacy violations, physical security risks (e.g., unlocking doors, disabling alarms), and potential cascading effects if the compromised system is integrated with other critical infrastructure. Enterprises using Home Assistant for building automation or operational technology may face operational disruptions and reputational damage. The vulnerability's exploitation requires only local network access, making it particularly dangerous in environments with poor network segmentation or where guest or IoT devices share the same network. Given the critical CVSS score and the broad impact on confidentiality, integrity, and availability, the threat poses a high risk to users worldwide, especially in regions with high adoption of smart home technologies.

Mitigation Recommendations

To mitigate CVE-2026-34205, organizations and users should immediately upgrade to Home Assistant Supervisor version 2026.03.02 or later, which contains the necessary fixes to restrict access to internal Docker bridge endpoints properly. Beyond patching, it is crucial to implement strict network segmentation to isolate Home Assistant devices and their associated apps from untrusted devices on the local network. Employ VLANs or separate SSIDs for IoT and guest devices to minimize exposure. Disable host network mode for apps unless absolutely necessary, and review app configurations to ensure they do not expose unauthenticated endpoints. Monitor network traffic for unusual access patterns to Home Assistant endpoints. Additionally, enforce strong local network access controls and consider deploying network intrusion detection systems capable of identifying anomalous behavior targeting IoT devices. Regularly audit and update all IoT and home automation software to maintain security posture.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-26T15:57:52.323Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c6e1b93c064ed76febd41a

Added to database: 3/27/2026, 7:59:53 PM

Last enriched: 3/27/2026, 8:14:50 PM

Last updated: 3/27/2026, 11:42:11 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses