Gardyn Security Incident

← All CVEs in ICSA-26-055-03

CVE-2025-29629

Use of Default Credentials

CVECVE-2025-29629
SeverityHigh (8.3)
Weakness (CWE)CWE-1392: Use of Default Credentials
Affected componentsFirmware <master.622
VendorGardyn Inc.
Affected productsGardyn Home Kit Models 1.0, 2.0, 3.0, 4.0; Gardyn Studio Models 1.0, 2.0
SectorFood and Agriculture (CISA classification)
Status per CISA Update ARemediated
CoordinatorCERT/CC (parent case VU#653116) and CISA

What is documented

Per the researcher’s coordinated-disclosure repository, Gardyn Home Kit devices ship with default credentials for SSH access. Per the researcher’s repository, the devices run on Raspberry Pi hardware with Raspbian 9 (Stretch), which reached end of life in June 2022.

Primary sources

Mitigation per CISA Update A

Per CISA Update A (April 2, 2026), this CVE is remediated. The fix versions stated by CISA are: Gardyn mobile application 2.11.0 or later; Gardyn cloud API 2.12.2026 or later; Home Kit firmware master.622 or later. See the CISA advisory and the how to update page.

← All CVEs in ICSA-26-055-03