CVE-2026-28766
Missing Authentication: User Account Endpoint
| CVE | CVE-2026-28766 |
|---|---|
| Severity | Critical (9.3) |
| Weakness (CWE) | CWE-306: Missing Authentication for Critical Function |
| Affected components | Cloud API <2.12.2026 |
| Vendor | Gardyn Inc. |
| Affected products | Gardyn Home Kit Models 1.0, 2.0, 3.0, 4.0; Gardyn Studio Models 1.0, 2.0 |
| Sector | Food and Agriculture (CISA classification) |
| Status per CISA Update A | Remediated |
| Coordinator | CERT/CC (parent case VU#653116) and CISA |
What is documented
Per the CISA advisory, an unauthenticated cloud API endpoint (/api/users) exposed records described in the advisory as “all user account information.” Per the researcher’s coordinated-disclosure repository, the records included names, email addresses, phone numbers, physical addresses, and the last_four partial payment-card field for approximately 134,215 customers. Per the researcher’s repository, the vendor stated to CISA that no access logging existed on the affected endpoint during the exposure window.
Primary sources
- CISA ICSA-26-055-03 (Update A)
- NVD: CVE-2026-28766
- MITRE CVE Record: CVE-2026-28766
- Disclosure repository
- Per-CVE researcher repository
Mitigation per CISA Update A
Per CISA Update A (April 2, 2026), this CVE is remediated. The fix versions stated by CISA are: Gardyn mobile application 2.11.0 or later; Gardyn cloud API 2.12.2026 or later; Home Kit firmware master.622 or later. See the CISA advisory and the how to update page.