{"api_version":"1","generated_at":"2026-04-22T23:23:04+00:00","cve":"CVE-2023-44385","urls":{"html":"https://cve.report/CVE-2023-44385","api":"https://cve.report/api/cve/CVE-2023-44385.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-44385","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-44385"},"summary":{"title":"CVE-2023-44385","description":"The Home Assistant Companion for iOS and macOS app up to version 2023.4 are vulnerable to Client-Side Request Forgery. Attackers may send malicious links/QRs to victims that, when visited, will make the victim to call arbitrary services in their Home Assistant installation. Combined with this security advisory, may result in full compromise and remote code execution (RCE). Version 2023.7 addresses this issue and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: GHSL-2023-161.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-10-19 23:15:00","updated_at":"2023-10-26 15:52:00"},"problem_types":["CWE-352"],"metrics":[],"references":[{"url":"https://github.com/home-assistant/core/security/advisories/GHSA-h2jp-7grc-9xpp","name":"https://github.com/home-assistant/core/security/advisories/GHSA-h2jp-7grc-9xpp","refsource":"MISC","tags":[],"title":"Client-Side Request Forgery in iOS/macOS native Apps · Advisory · home-assistant/core · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-44385","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44385","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"44385","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"home-assistant","cpe5":"home_assistant_companion","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"iphone_os","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44385","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"home-assistant","cpe5":"home_assistant_companion","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"macos","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-44385","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The Home Assistant Companion for iOS and macOS app up to version 2023.4 are vulnerable to Client-Side Request Forgery. Attackers may send malicious links/QRs to victims that, when visited, will make the victim to call arbitrary services in their Home Assistant installation. Combined with this security advisory, may result in full compromise and remote code execution (RCE). Version 2023.7 addresses this issue and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: GHSL-2023-161."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352: Cross-Site Request Forgery (CSRF)","cweId":"CWE-352"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"home-assistant","product":{"product_data":[{"product_name":"core","version":{"version_data":[{"version_affected":"=","version_value":"< 2023.7"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/home-assistant/core/security/advisories/GHSA-h2jp-7grc-9xpp","refsource":"MISC","name":"https://github.com/home-assistant/core/security/advisories/GHSA-h2jp-7grc-9xpp"}]},"source":{"advisory":"GHSA-h2jp-7grc-9xpp","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":8.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-10-19 23:15:00","lastModifiedDate":"2023-10-26 15:52:00","problem_types":["CWE-352"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:home-assistant:home_assistant_companion:*:*:*:*:*:macos:*:*","versionEndExcluding":"2023.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:home-assistant:home_assistant_companion:*:*:*:*:*:iphone_os:*:*","versionEndExcluding":"2023.7","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}