The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-65290

CVE-2025-65290: Aqara Hub M2 Information Disclosure Flaw

CVE-2025-65290 is an information disclosure vulnerability in Aqara Hub M2 Firmware that fails to validate HTTPS certificates, enabling man-in-the-middle attacks. This article covers technical details, affected versions, impact, and mitigation strategies.

Updated: May 19, 2026

CVE-2025-65290 Overview

CVE-2025-65290 is a certificate validation vulnerability affecting multiple Aqara Hub smart home devices. The affected hubs do not validate server certificates during HTTPS firmware downloads, allowing attackers positioned on the network path to intercept Over-The-Air (OTA) update traffic. An attacker performing a man-in-the-middle (MITM) attack can serve modified firmware images to the device. This weakness is categorized under CWE-295: Improper Certificate Validation. The flaw impacts Aqara Camera Hub G3 firmware 4.1.9_0027, Hub M2 firmware 4.3.6_0027, and Hub M3 firmware 4.3.6_0025. Successful exploitation can compromise both the confidentiality and integrity of firmware delivery to consumer IoT devices.

Critical Impact

Attackers on the network path can intercept OTA firmware downloads and deliver tampered firmware to Aqara Hub devices, enabling persistent device compromise.

Affected Products

  • Aqara Camera Hub G3 firmware 4.1.9_0027
  • Aqara Hub M2 firmware 4.3.6_0027
  • Aqara Hub M3 firmware 4.3.6_0025

Discovery Timeline

  • 2025-12-10 - CVE-2025-65290 published to NVD
  • 2025-12-17 - Last updated in NVD database

Technical Details for CVE-2025-65290

Vulnerability Analysis

The vulnerability resides in the firmware update routine of the affected Aqara Hub devices. When the hub requests an OTA firmware image over HTTPS, the client implementation does not properly validate the TLS server certificate presented by the update endpoint. The Transport Layer Security (TLS) handshake completes without verifying certificate chain, hostname, or trust anchors. As a result, any certificate, including a self-signed or attacker-controlled certificate, is accepted as valid. This breaks the integrity and authentication guarantees that HTTPS is intended to provide for firmware distribution.

Root Cause

The root cause is improper certificate validation [CWE-295] in the HTTPS client used by the firmware updater. Either the device skips verification entirely or the verification callback returns success regardless of the certificate state. Firmware update channels require strict certificate pinning or full chain validation, and neither is enforced on the affected builds.

Attack Vector

Exploitation requires the attacker to occupy a network position between the device and the Aqara update servers. Suitable positions include compromised home routers, rogue Wi-Fi access points, ARP spoofing on the local network segment, or upstream network compromise. Once positioned, the attacker intercepts the HTTPS update request, presents an arbitrary TLS certificate, and serves a modified firmware payload. Because certificate validation is bypassed, the device proceeds with the download and may install attacker-supplied firmware if additional firmware signing checks are absent or also bypassed.

No verified public exploit code is available. See the GitHub PoC Repository for technical details documented by the reporter.

Detection Methods for CVE-2025-65290

Indicators of Compromise

  • Unexpected outbound TLS connections from Aqara Hub devices to hosts that are not official Aqara update endpoints.
  • TLS sessions from hub devices negotiated with certificates that are self-signed or issued by untrusted certificate authorities.
  • Firmware version strings on hubs that do not match any official Aqara release manifest.
  • Unusual device reboots or behavior changes immediately following an OTA update window.

Detection Strategies

  • Inspect network flow records for HTTPS traffic from Aqara hubs and compare destination IPs and SNI fields against the vendor's known update infrastructure.
  • Deploy passive TLS monitoring to log server certificate fingerprints presented to IoT devices and alert on changes.
  • Use a network tap or span port to capture firmware download sessions and validate file hashes against vendor-published values.

Monitoring Recommendations

  • Segment IoT devices onto a dedicated VLAN with logging at the gateway to centralize visibility into outbound update traffic.
  • Alert on ARP table changes and DHCP anomalies on segments where Aqara hubs reside, since MITM positioning often relies on these techniques.
  • Track firmware version inventory across all Aqara devices and investigate any version that deviates from approved baselines.

How to Mitigate CVE-2025-65290

Immediate Actions Required

  • Identify all Aqara Camera Hub G3, Hub M2, and Hub M3 devices on the network and confirm their current firmware versions.
  • Restrict the affected hubs to trusted network segments and block lateral access from untrusted Wi-Fi or guest networks.
  • Monitor vendor channels for an Aqara firmware update that addresses improper certificate validation in the OTA client.
  • Avoid triggering manual firmware updates on untrusted networks until a patched release is confirmed.

Patch Information

At the time of publication, no vendor advisory or patched firmware version is listed in the NVD record for CVE-2025-65290. Administrators should monitor the Aqara support site and the public vulnerability report for updates on a corrected OTA client that enforces TLS certificate validation.

Workarounds

  • Place Aqara hubs on a dedicated network segment with egress filtering that only permits connections to verified Aqara update endpoints.
  • Use DNS filtering or static host entries to ensure firmware update domains resolve only to legitimate vendor infrastructure.
  • Disable automatic OTA updates where the device permits, and perform updates only over a controlled and monitored network path.
  • Apply strong Wi-Fi security and disable legacy protocols on the local network to reduce the likelihood of an attacker gaining a MITM position.
bash
# Example: isolate Aqara hubs on a dedicated VLAN and restrict egress
# (adjust interface, VLAN ID, and update endpoints to your environment)

# Create IoT VLAN
ip link add link eth0 name eth0.40 type vlan id 40
ip addr add 192.0.2.1/24 dev eth0.40
ip link set eth0.40 up

# Allow only DNS and HTTPS to known Aqara update infrastructure
iptables -A FORWARD -i eth0.40 -p udp --dport 53 -j ACCEPT
iptables -A FORWARD -i eth0.40 -p tcp --dport 443 -d <aqara-update-endpoint> -j ACCEPT
iptables -A FORWARD -i eth0.40 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechAqara

  • SeverityHIGH

  • CVSS Score7.4

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-295
  • Technical References
  • GitHub PoC Repository
  • Related CVEs
  • CVE-2025-65291: Aqara Hub M2 Information Disclosure Flaw

  • CVE-2025-65295: Aqara Hub M2 Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English