{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T14:46:24.850","vulnerabilities":[{"cve":{"id":"CVE-2025-25305","sourceIdentifier":"security-advisories@github.com","published":"2025-02-18T19:15:29.083","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Home Assistant Core is an open source home automation that puts local control and privacy first. Affected versions are subject to a potential man-in-the-middle attacks due to missing SSL certificate verification in the project codebase and used third-party libraries. In the past, `aiohttp-session`/`request` had the parameter `verify_ssl` to control SSL certificate verification. This was a boolean value. In `aiohttp` 3.0, this parameter was deprecated in favor of the `ssl` parameter. Only when `ssl` is set to `None` or provided with a correct configured SSL context the standard SSL certificate verification will happen. When migrating integrations in Home Assistant and libraries used by Home Assistant, in some cases the `verify_ssl` parameter value was just moved to the new `ssl` parameter. This resulted in these integrations and 3rd party libraries using `request.ssl = True`, which unintentionally turned off SSL certificate verification and opened up a man-in-the-middle attack vector. This issue has been addressed in version 2024.1.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"Home Assistant Core es una automatización de origen de código abierto que pone primero el control local y la privacidad. Las versiones afectadas están sujetas a los posibles ataques de hombre en el medio debido a la verificación de certificado SSL faltante en la base de código del proyecto y usaron de terceros librerías. En el pasado, `aiohttp-session`/` request 'tenía el parámetro `verify_ssl` para controlar la verificación del certificado SSL. Este era un valor booleano. En `aiohttp` 3.0, este parámetro estaba desapercibido a favor del parámetro` SSL`. Solo cuando `SSL` se establece en` None` o se proporciona con un contexto SSL configurado correcto, la verificación de certificado SSL estándar ocurrirá. Al migrar las integraciones en el Asistente de inicio librerías Aries utilizados por el Asistente de inicio, en algunos casos el valor del parámetro `Verify_SSL` se movió al nuevo parámetro` SSL`. Esto dio como resultado estas integraciones y librerías usando `request.ssl ??= true`, que desactivó involuntariamente la verificación del certificado SSL y abrió un vector de ataque de hombre en el medio. Este problema se ha abordado en la versión 2024.1.6 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L","baseScore":7.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":4.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-940"}]}],"references":[{"url":"https://github.com/home-assistant/core/security/advisories/GHSA-m3pm-rpgg-5wj6","source":"security-advisories@github.com"}]}}]}