I am going through the same thoughts on what actions to take
I too doubt the security flaw has been generally known in hacker communities because we would have this thread starting filling up with people experiencing stories of identity thelfs, ransomware attacks, etc
A foreign power could have planted malware to be activated later but I dount they would attack private Home Assistant installations. We are not interesting enough.
I went through my secrets file and found that 90% of sensitive secret content was actually no longer used either because yaml based integrations had turned into GUI and not using any secrets. I strongly suggest anyone to do the same.
Changing the HA password if your HA needs to be exposed to the internet is an obvious action
And then the real danger is where you have given Home Assistant access to the type of accounts where people can either steel your identity or hi-jack accounts that shut you out of your life. Or accounts where people can change a ship to address and start ordering stuff in your name
So services like
- Google - Can you live with your Gmail email being taken over?
- Amazon - besides Alexa that is a shopping thing
- Cloud based integrations where the account being abused can mean stolen identity or purchases. A Philips Hue account is probably not going to be a huge disaster if attacked
I would be less worried about password to things that are inside your home like your MQTT server or your Door camera.
Some time ago I my Synology NAS hardware and also got DSM7
I chose btrfs as file system and enabled the snapshot feature.
I have a user account for admin only for DSM
And a user that can access files for everyday use.
And backups to external Hardware. And extra sensitive stuff like Family Photos and the music rips that took me 2 months are also backed up to additional hard drives that are normally not connected
If someone attacks us - they may do so while my Windows machine has a drive mapped to the NAS and they can encrypt all my files on the NAS. But this account cannot access snap shots or any admin tasks
In the event of a ransomware attack and encrypted NAS, I should be able to restore to a btrfs snapshot from before the attack.
And if the DSM has a vulnerability, I still have my off line backups. The end goal being that I can say f**k you to any ransomware attacker
I am putting my emphasis on anything that HA does on DSM like Samba shares or DSM integration. And I am addressing the credentials of the external service where I would not want to loose control of my account
But I am not going to panik about my ESP Home devices or my MQTT box.
It is a matter of personal choice of actions based on your personal risk assessment.
For my external access - I have removed my reverse proxy and no longer provide any external access. And I have disabled the HA remote control (the feature that I am still worried about being re-activated by an attacker gaining access to Nabucasa).
And all remote access is done with Wireguard.
Setting up Wireguard on your phones and tablets and setting it to only tunnel local 192.168 IPs works really well with the HA IOS app as well as the Android App.
You just setup the local IP address only and the HA app will use that and it gets tunneled through Wireguard. That is one single point of attach.
Many others use Cloudflare - I have no experience with that. And little trust as I do not understand it. I understand Wireguard and I trust the Linux kernel people that has implemented it so that is my choice of external access
There is no right or wrong here. I am just sharing my thoughts and actions