We actively maintain and provide security updates for the following versions:
| Version | Supported |
|---|---|
| 1.1.x | ✅ |
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take the security of Webasto Next seriously. If you discover a security vulnerability, please follow these steps:
- Do NOT open a public GitHub issue for security vulnerabilities.
- Instead, report security issues privately by:
- Opening a Security Advisory on GitHub (preferred)
- Or sending an email to the maintainer via GitHub (if advisories are unavailable)
Please provide as much information as possible:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact and severity assessment
- Any suggested fixes or mitigations
- Your contact information for follow-up
- Acknowledgment: We will acknowledge receipt of your report within 48 hours.
- Investigation: We will investigate and validate the vulnerability within 5 business days.
- Updates: We will keep you informed of our progress throughout the resolution process.
- Resolution: We aim to release a patch within 30 days for confirmed vulnerabilities.
- Credit: With your permission, we will publicly credit you for the discovery once the vulnerability is resolved.
When using this integration:
- Local Network Only: This integration communicates with wallboxes over your local network. Ensure your network is properly secured.
- Firewall: Consider restricting Modbus TCP (port 502) and REST API access (port 80) to trusted devices only.
- No Internet Exposure: Never expose your wallbox directly to the internet without proper security measures.
- REST API Credentials: If you enable REST API features, credentials are stored securely in Home Assistant's encrypted storage.
- Strong Passwords: Use strong, unique passwords for your wallbox web interface.
- Default Credentials: Change default credentials (username:
admin) immediately after installation.
- Keep Updated: Always use the latest version of this integration to receive security patches.
- Wallbox Firmware: Keep your wallbox firmware updated according to manufacturer recommendations.
- Home Assistant: Keep your Home Assistant installation updated.
- Modbus TCP protocol does not include built-in authentication or encryption.
- Communication occurs in plaintext over your local network.
- Only deploy in trusted network environments.
- REST API credentials are transmitted over HTTP (not HTTPS by default on most wallboxes).
- Use secure network practices (e.g., dedicated VLAN for IoT devices).
- The integration sends periodic "keep-alive" signals (Life Bit) to maintain wallbox responsiveness.
- This is a safety feature implemented by the wallbox manufacturer.
- Failure to send Life Bit signals triggers the wallbox fail-safe mechanism.
This security policy covers:
- The Home Assistant custom component code in this repository
- The virtual wallbox simulator (for development/testing only)
- Integration-specific configuration and data handling
Out of Scope:
- Vulnerabilities in the wallbox hardware or firmware (report to Webasto/Ampure)
- Home Assistant core vulnerabilities (report to Home Assistant project)
- Third-party dependencies (report to respective maintainers)
Security updates are announced via:
- GitHub Security Advisories
- Release notes in
CHANGELOG.md - GitHub Releases with appropriate tags
For questions about this security policy, open a discussion in the GitHub Discussions board or contact the maintainer.