CVE-2025-65290

7.4 HIGH

📋 TL;DR

Aqara Hub devices fail to validate server certificates during HTTPS firmware downloads, allowing man-in-the-middle attackers to intercept update traffic and serve malicious firmware. This affects Camera Hub G3, Hub M2, and Hub M3 devices with specific firmware versions. Attackers could potentially compromise device functionality or gain unauthorized access.

💻 Affected Systems

Products:
  • Aqara Camera Hub G3
  • Aqara Hub M2
  • Aqara Hub M3
Versions: Camera Hub G3 4.1.9_0027, Hub M2 4.3.6_0027, Hub M3 4.3.6_0025
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with these firmware versions are vulnerable by default. The vulnerability exists during the firmware update process.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers serve malicious firmware that gives them persistent remote access to the device, allowing them to compromise the entire smart home network, steal sensitive data, or use the device as a botnet node.

🟠

Likely Case

Attackers intercept firmware updates to install modified firmware that disables security features, collects user data, or provides backdoor access to the local network.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to the compromised device only, preventing lateral movement to other systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires man-in-the-middle position during firmware update. Public technical details available in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Monitor Aqara official channels for firmware updates. 2. When available, update affected devices through official app. 3. Verify update completes successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Aqara Hub devices on separate VLAN or network segment to limit attack surface

Disable Automatic Updates

all

Prevent automatic firmware updates that could be intercepted

🧯 If You Can't Patch

  • Physically disconnect devices from internet and use local-only functionality
  • Monitor network traffic for unusual outbound connections or firmware update attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version in Aqara Home app: Settings > About Device > Firmware Version

Check Version:

Not applicable - use Aqara Home app interface

Verify Fix Applied:

Verify firmware version is updated beyond vulnerable versions listed in affected_systems

📡 Detection & Monitoring

Log Indicators:

  • Unusual firmware update activity
  • Failed certificate validation attempts
  • Unexpected device reboots

Network Indicators:

  • HTTPS traffic to firmware servers without certificate validation
  • Unusual outbound connections from hub devices
  • MITM attack patterns during update windows

SIEM Query:

Not applicable - device-specific logging limited

🔗 References

📤 Share & Export