Description
Philips Hue Bridge HomeKit Pair-Setup Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the hk_hap_pair_storage_put function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the HomeKit service. Was ZDI-CAN-28326.
Published: 2026-03-13
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Philips Hue Bridge HomeKit Pair-Setup Heap-based Buffer Overflow Remote Code Execution Vulnerability allows a network-adjacent attacker to execute arbitrary code as the HomeKit service. The flaw resides in hk_hap_pair_storage_put where user-supplied data is copied into a fixed-length heap buffer without length validation, leading to a buffer overflow. This weakness (CWE-122) can compromise confidentiality, integrity, and availability of the device and connected homes.

Affected Systems

The vulnerability affects Philips Hue Bridge devices. Specific firmware or software version information is not provided in the available data.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity. The EPSS score is under 1%, suggesting a low current exploitation probability, but the vulnerability is not listed in the CISA KEV catalog. Exploitation requires no authentication and is accessible over the network, making it potentially exploitable by attackers in proximity to the bridge. The exploit path involves crafting malicious HomeKit pairing data that triggers the buffer overflow and enables arbitrary code execution.

Generated by OpenCVE AI on March 16, 2026 at 23:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware or vendor patch for Philips Hue Bridge as soon as it is released.
  • If a patch is not yet available, isolate the Hue Bridge from untrusted or external networks and disable HomeKit pairing functionality to prevent exposure.
  • Continuously monitor Philips’ official channels for update releases and apply them promptly once available.

Generated by OpenCVE AI on March 16, 2026 at 23:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Phillips
Phillips hue Bridge
Vendors & Products Phillips
Phillips hue Bridge

Fri, 13 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description Philips Hue Bridge HomeKit Pair-Setup Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. Authentication is not required to exploit this vulnerability. The specific flaw exists within the hk_hap_pair_storage_put function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the HomeKit service. Was ZDI-CAN-28326.
Title Philips Hue Bridge HomeKit Pair-Setup Heap-based Buffer Overflow Remote Code Execution Vulnerability
Weaknesses CWE-122
References
Metrics cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Phillips Hue Bridge
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-03-16T20:17:16.686Z

Reserved: 2026-03-04T19:42:32.733Z

Link: CVE-2026-3556

cve-icon Vulnrichment

Updated: 2026-03-16T20:17:11.127Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:19:48.663

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-3556

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:39:54Z

Weaknesses