CVE-2023-27482
NixOS vulnerability analysis and mitigation

Overview

A critical authentication bypass vulnerability (CVE-2023-27482) was discovered in Home Assistant affecting versions before 2023.3.2 and Home Assistant Supervisor versions before 2023.03.3. The vulnerability allowed unauthenticated remote attackers to bypass authentication and directly access the Supervisor API through Home Assistant. This vulnerability impacted Home Assistant OS and Home Assistant Supervised installations, while Home Assistant Container and Home Assistant Core installations were not affected (GitHub Advisory, Home Assistant Blog).

Technical details

The vulnerability existed in the Home Assistant Supervisor Integration that allowed an unauthenticated user to access any Supervisor API endpoint. The issue stemmed from the way path traversal was handled in URL processing, where payloads like 'app/.%252e/supervisor/info' could bypass security filters. The integration was installed by default on Home Assistant OS and Home Assistant Supervised installations, and according to analytics, was used by 74.9% of active installations at the time of discovery (Elttam Advisory).

Impact

The vulnerability allowed attackers to achieve remote code execution as root on the host system, create and download full backups containing authentication keys, access secrets.yaml files containing passwords and API keys for third-party services, and access the Home Assistant Database containing events data. This could lead to complete takeover of a home automation system and give attackers the ability to control cameras, listen to private conversations, and gain access to sensitive credentials stored in plaintext (Elttam Blog).

Mitigation and workarounds

The issue was patched in Home Assistant Core version 2023.3.2 and Supervisor version 2023.03.3. The fix was automatically rolled out to affected installations via the Supervisor auto-update feature. For users unable to upgrade, the recommended workaround was to not expose the Home Assistant instance to the internet (GitHub Advisory, Home Assistant Blog).

Community reactions

The vulnerability received significant attention in the security community, with discussions on platforms like Hacker News, Reddit, and the Home Assistant forums. The disclosure process faced some criticism regarding the clarity of security advisory details and the timing of patch releases (Elttam Blog).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-12819HIGH8.1
  • NixOSNixOS
  • pgbouncer
NoYesDec 03, 2025
CVE-2025-20777MEDIUM6.7
  • NixOSNixOS
  • android
NoNoDec 02, 2025
CVE-2025-65105MEDIUM5.3
  • NixOSNixOS
  • apptainer
NoYesDec 02, 2025
CVE-2025-20789MEDIUM4.4
  • NixOSNixOS
  • android
NoNoDec 02, 2025
CVE-2025-20788MEDIUM4.4
  • NixOSNixOS
  • android
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management