PatchSiren cyber security CVE debrief
CVE-2025-59448 YoSmart CVE debrief
CISA's 2026-01-13 advisory for CVE-2025-59448 says parts of the YoSmart YoLink ecosystem used unencrypted MQTT communications, creating risk of disclosure or tampering if an attacker can observe network traffic. The issue affects YoLink Mobile Application 1.40.41 and the YoLink MQTT Broker; YoSmart recommends updating to 1.40.45 or later.
- Vendor
- YoSmart
- Product
- YoLink Smart Hub
- CVSS
- MEDIUM 4.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-01-13
- Original CVE updated
- 2026-01-13
- Advisory published
- 2026-01-13
- Advisory updated
- 2026-01-13
Who should care
Operators and administrators of YoSmart YoLink Smart Hub deployments, especially environments using YoLink Mobile Application 1.40.41 or the YoLink MQTT Broker, and teams responsible for network monitoring, segmentation, or IoT/OT device management.
Technical summary
The advisory describes cleartext MQTT traffic in the YoSmart YoLink ecosystem through 2025-10-02. Because MQTT messages are not encrypted in transit, a capable network observer may learn sensitive information or alter messages to influence affected devices. CISA's supplied CVSS vector is CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N with a MEDIUM score of 4.7.
Defensive priority
Medium priority. The issue is not listed in KEV, but it can expose sensitive data and enable device tampering, so patching and exposure reduction should be scheduled promptly.
Recommended defensive actions
- Update YoLink Mobile Application and YoLink MQTT Broker to version 1.40.45 or later, as recommended by YoSmart.
- Inventory YoSmart YoLink components and confirm which systems are at or below version 1.40.41.
- Restrict who can observe or reach MQTT-related traffic, and reduce exposure through network segmentation where feasible.
- Monitor for unexpected device state changes or MQTT anomalies that could indicate tampering.
- Review the CISA advisory and YoSmart security advisory for any vendor-specific mitigation guidance.
Evidence notes
Based on CISA CSAF advisory ICSA-26-013-03 and its referenced YoSmart security advisory. The source states the issue affects YoLink Mobile Application 1.40.41 and YoLink MQTT Broker, recommends updating to 1.40.45 or later, and describes unencrypted MQTT communications through 2025-10-02. Timing in this debrief is taken from the advisory's 2026-01-13 publication date.
Official resources
-
CVE-2025-59448 CVE record
CVE.org
-
CVE-2025-59448 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by CISA on 2026-01-13 in ICSA-26-013-03. The supplied source corpus marks this as the initial publication and does not identify the issue as KEV-listed.