Home Assistant exposes unauthenticated endpoints
CVE-2026-34205
CVE-2026-34205 exposes unauthenticated Home Assistant app endpoints to your local network, enabling RCE. Update Supervisor to 2026.03.02 immediately.
Patch now - CVE-2026-34205 is a critical network isolation flaw in Home Assistant Supervisor (before 2026.03.02) on Linux that grants unauthenticated remote access to internal app endpoints, enabling remote code execution. Update Supervisor to version 2026.03.02 immediately to block local network attacks.
Overview
A critical security vulnerability has been identified in Home Assistant, the popular open-source home automation platform. This flaw, tracked as CVE-2026-34205, involves a misconfiguration that can expose unauthenticated internal services to other devices on your local network, bypassing intended security controls.
Vulnerability Details
Home Assistant allows the use of “apps” (formerly add-ons) to extend functionality. When these apps are configured to use the host’s network mode for performance or compatibility, they are intended to be accessible only from the Home Assistant host machine itself. However, due to a security oversight on Linux systems, these app endpoints were incorrectly bound to the Docker bridge network interface. This interface is accessible to other devices on the same local network (like your Wi-Fi), effectively removing the intended network isolation. Any device on that network could then interact with these app endpoints without requiring any authentication.
Impact and Risk
This vulnerability is rated CRITICAL with a CVSS score of 9.6. The primary risk is that an attacker who gains access to your local network-whether via a compromised device, a guest, or a malicious insider-could directly communicate with these exposed Home Assistant apps. The impact depends entirely on the functionality of the specific apps running. This could range from information disclosure to full remote code execution, potentially allowing an attacker to manipulate smart home devices, access sensitive data, or establish a persistent foothold for further attacks. This type of local network breach is a common initial access vector, as seen in campaigns like those involving TernDoor and BruteEntry.
Remediation and Mitigation
The issue has been addressed in Home Assistant Supervisor version 2026.03.02.
Immediate Action Required:
- Update Immediately: All Home Assistant users, especially those on Linux, must update the Supervisor to version 2026.03.02 or later. This update corrects the network binding behavior to enforce proper isolation.
- Verify Update: Navigate to Settings > System > Updates in your Home Assistant dashboard. Apply the available Supervisor update and ensure your system reports version 2026.03.02.
- Network Segmentation: As a general security best practice, consider placing your Home Assistant instance and IoT devices on a dedicated, segregated network VLAN. This limits the potential attack surface from other network devices.
This flaw highlights the importance of correct security boundary enforcement, a principle also critical in other Linux security frameworks like AppArmor. Applying the provided update is the only complete solution to this critical vulnerability.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
WordPress MStore API 2.0.6 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files by sending POST requests to the REST API endpoint. Attackers ...
OpenCATS 0.9.4 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands by uploading malicious PHP files disguised as resume attachments. Atta...
In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the SOAP extension's object deduplication mechanism stores pointers to PHP objects in a global ma...
electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.3.8, a command injection vulnerability exists in github.com/elcterm/electerm/npm/install.js...