Gardyn Security Incident

For Researchers

Technical materials related to CISA advisory ICSA-26-055-03 and the ten CVEs.

Disclosure repositories

Main advisory repositorygithub.com/MichaelAdamGroberman/ICSA-26-055-03
CERT/CC parent casegithub.com/MichaelAdamGroberman/VU653116

Per-CVE repositories

Attack chains, per the researcher’s repository

Chain 1. CVE-2025-1242 (hardcoded iothubowner credential) plus CVE-2025-29631 (command injection in upgrade()) yields, per the repository, unauthenticated remote code execution as root on registered devices (138,160+).

Chain 2. CVE-2026-28766 (unauthenticated /api/users) plus CVE-2026-25197 (IDOR on /api/user/{id} with sequential integer ids) provides, per the repository, PII access for 134,215 user records, including names, email addresses, phone numbers, and the last_four partial payment-card field.

Prior work

Per the researcher’s repository, CVE-2025-29628, CVE-2025-29629, and CVE-2025-29631 were originally disclosed by mselbrede in February 2025, with technical details and a proof-of-concept published in July 2025.

Other references

Contact

See the contact page. PGP and Signal available.