Description
Philips Hue Bridge Zigbee Stack Custom Command Handler Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. User interaction is required to exploit this vulnerability in that the user must initiate the device pairing process.

The specific flaw exists within the handling of custom Zigbee ZCL frames in the Model Info download functionality. The issue results from the lack of proper validation of the size of data prior to copying it to a fixed-size heap buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-28276.
Published: 2026-03-13
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a heap-based buffer overflow in the Philips Hue Bridge Zigbee stack during the handling of custom Zigbee ZCL frames in the Model Info download functionality. Because the firmware does not validate the size of the data before copying it to a fixed‑size heap buffer, a network‑adjacent attacker can trigger the overflow and execute arbitrary code in the context of the device. This remote code execution can potentially allow the attacker to compromise the bridge’s firmware and any home automation functions it controls.

Affected Systems

The affected systems are Philips Hue Bridge devices. No specific firmware or model versions are provided in the data, so all current and unpatched installations of Philips Hue Bridge are potentially vulnerable.

Risk and Exploitability

The CVSS score is 8, indicating high severity, and the EPSS score is less than 1%, indicating a low probability of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires a local‑network attacker and user interaction to initiate the device pairing process, so the attack vector is network‑adjacent with user interaction.

Generated by OpenCVE AI on March 16, 2026 at 23:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Philips Hue support site for firmware updates addressing the buffer overflow.
  • If an update is available, apply it immediately to all Hue Bridge devices.
  • If no update exists, isolate the Hue Bridge on a dedicated VLAN or network segment and block unauthorized Zigbee pairing traffic.
  • Enable network monitoring to detect abnormal pairing attempts and enforce strict access controls.

Generated by OpenCVE AI on March 16, 2026 at 23:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Phillips
Phillips hue Bridge
Vendors & Products Phillips
Phillips hue Bridge

Fri, 13 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description Philips Hue Bridge Zigbee Stack Custom Command Handler Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. User interaction is required to exploit this vulnerability in that the user must initiate the device pairing process. The specific flaw exists within the handling of custom Zigbee ZCL frames in the Model Info download functionality. The issue results from the lack of proper validation of the size of data prior to copying it to a fixed-size heap buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-28276.
Title Philips Hue Bridge Zigbee Stack Custom Command Handler Heap-based Buffer Overflow Remote Code Execution Vulnerability
Weaknesses CWE-122
References
Metrics cvssV3_0

{'score': 8, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Phillips Hue Bridge
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-03-16T20:16:14.612Z

Reserved: 2026-03-04T19:42:29.133Z

Link: CVE-2026-3555

cve-icon Vulnrichment

Updated: 2026-03-16T20:16:10.797Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:19:48.493

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-3555

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:39:55Z

Weaknesses