Security experts from Check Point discovered a high-severity flaw (CVE-2020-6007) in Philips Hue Smart Light Bulbs that can be exploited by hackers to gain entry into a targeted WiFi network.
Lightbulbs could be remotely controlled through a mobile app or via a digital home assistant, owners could control the light in the environment and even calibrate the color of each lightbulb. Smart lightbulbs are managed over the air via WiFi protocol or ZigBee, a low bandwidth radio protocol.
Check Point experts demonstrated that it is possible to trigger the issue into Philips Hue Smart Light Bulbs over-the-air from over 100 meters away.
The CVE-2020-6007 flaw ties the way Philips implemented the Zigbee communication protocol in its smart light bulb, it could lead to a heap-based buffer overflow issue.
ZigBee is an IEEE 802.15.4-based specification for a suite of high-level communication protocols used to create personal area networks with small, low-power digital radios, such as for home automation, medical device data collection, and other low-power low-bandwidth needs, designed for small scale projects which need wireless connection.
The buffer overflow occurs in the “bridge” component that accepts remote commands sent to the bulb over Zigbee protocol from other devices such as a mobile app.
“Check Point’s researchers showed how a threat actor could exploit an IoT network (smart lightbulbs and their control bridge) to launch attacks on conventional computer networks in homes, businesses or even smart cities.” reads the report published by CheckPoint.”Our researchers focused on the market-leading Philips Hue smart bulbs and bridge, and found vulnerabilities (CVE-2020-6007) that enabled them to infiltrate networks using a remote exploit in the ZigBee low-power wireless protocol that is used to control a wide range of IoT devices.”
Researchers did not reveal technical details or PoC exploit for the vulnerability to allow users to patch their systems.
The researchers published is a video that shows how they have exploited the vulnerabilities in the Philips Hue bridge to compromise a target computer network and to attack the computer itself using the EternalBlue exploit.
Below the attack chain that was visible in the video PoC:
“Many of us are aware that IoT devices can pose a security risk, but this research shows how even the most mundane, seemingly ‘dumb’ devices such as lightbulbs can be exploited by hackers and used to take over networks, or plant malware.” explianed Yaniv Balmas, head of cyber research at Check Point. “It’s critical that organizations and individuals protect themselves against these possible attacks by updating their devices with the latest patches and separating them from other machines on their networks, to limit the possible spread of malware. In today’s complex fifth-generation attack landscape, we cannot afford to overlook the security of anything that is connected to our networks.”
Check Point reported the issue to Philips and Signify (owner of the Philips Hue brand) in November 2019. The company released firmware patches for the device in January.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Smart Light Bulbs, hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]
Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of…
Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can…
Researchers released an exploit code for the actively exploited vulnerability CVE-2024-3400 in Palo Alto Networks'…
Cisco Talos warns of large-scale brute-force attacks against a variety of targets, including VPN services,…
The PuTTY Secure Shell (SSH) and Telnet client are impacted by a critical vulnerability that could…
Researchers warn of a renewed cyber espionage campaign targeting users in South Asia with the…
This website uses cookies.