CVE-2025-25305

7.0 HIGH

📋 TL;DR

CVE-2025-25305 is a man-in-the-middle vulnerability in Home Assistant Core caused by improper SSL certificate verification. When integrations migrated from aiohttp 2.x to 3.x, the verify_ssl parameter was incorrectly mapped to the new ssl parameter, disabling certificate validation. This affects Home Assistant users running versions before 2024.1.6.

💻 Affected Systems

Products:
  • Home Assistant Core
Versions: All versions before 2024.1.6
Operating Systems: All platforms running Home Assistant
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects integrations and third-party libraries that use the affected aiohttp migration pattern. Core functionality may still be vulnerable depending on integration usage.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept and modify all communication between Home Assistant and external services, potentially stealing credentials, injecting malicious commands, or compromising the entire smart home system.

🟠

Likely Case

Attackers on the same network could intercept API calls to third-party services, potentially gaining access to cloud accounts or modifying automation behavior.

🟢

If Mitigated

With proper network segmentation and monitoring, impact would be limited to potential data leakage from intercepted communications.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires network position to intercept traffic. No public exploit code available as of advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.1.6 and later

Vendor Advisory: https://github.com/home-assistant/core/security/advisories/GHSA-m3pm-rpgg-5wj6

Restart Required: No

Instructions:

1. Backup your Home Assistant configuration. 2. Update Home Assistant Core to version 2024.1.6 or later via the Supervisor panel or command line. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

No workarounds available

all

The vendor advisory states there are no known workarounds for this vulnerability.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Home Assistant from untrusted networks
  • Monitor network traffic for unexpected SSL/TLS certificate changes or man-in-the-middle patterns

🔍 How to Verify

Check if Vulnerable:

Check Home Assistant version in Configuration > Info or run 'ha core info' in terminal. If version is below 2024.1.6, system is vulnerable.

Check Version:

ha core info | grep version

Verify Fix Applied:

After updating, verify version is 2024.1.6 or higher. Check that integrations using external APIs continue to function properly.

📡 Detection & Monitoring

Log Indicators:

  • SSL certificate verification errors in Home Assistant logs
  • Unexpected certificate authorities in SSL handshakes

Network Indicators:

  • Unusual SSL/TLS certificate chains in traffic to/from Home Assistant
  • Self-signed certificates in what should be validated connections

SIEM Query:

source="home-assistant" AND ("SSL" OR "certificate" OR "verify") AND ("error" OR "warning" OR "failed")

🔗 References

📤 Share & Export