From 33ad64d3b422d47c03ceb28d9657d280d4e92e68 Mon Sep 17 00:00:00 2001 From: Franck Nijhof Date: Wed, 8 Mar 2023 12:41:45 +0100 Subject: [PATCH] Add workaround FAQ to Supervisor Security Disclosure (#26495) --- .../2023-03-08-supervisor-security-disclosure.markdown | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/source/_posts/2023-03-08-supervisor-security-disclosure.markdown b/source/_posts/2023-03-08-supervisor-security-disclosure.markdown index bfab90ba08e..110bef2087a 100644 --- a/source/_posts/2023-03-08-supervisor-security-disclosure.markdown +++ b/source/_posts/2023-03-08-supervisor-security-disclosure.markdown @@ -65,3 +65,9 @@ We have published [security advisory CVE-2023-27482 on GitHub][advisory]. ### Has this vulnerability been abused? We don’t know. We have not heard any reports of people being hacked. + +### Is there a workaround? + +In case one is not able to upgrade the Home Assistant Supervisor or the +Home Assistant Core application at this time, it is advised to not expose +your Home Assistant instance to the internet.