Description
Philips Hue Bridge HomeKit Accessory Protocol Static Nonce Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Philips Hue Bridge. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the configuration of the SRP authentication mechanism in the HomeKit Accessory Protocol service, which listens on TCP port 8080 by default. The issue results from the use of a static nonce value. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-28451.
Published: 2026-03-13
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Immediate Patch
AI Analysis

Impact

The reported flaw in Philips Hue Bridge’s HomeKit Accessory Protocol uses a static nonce in the SRP authentication flow, allowing an attacker on the same local network to bypass authentication entirely. This bypass is enabled by design, meaning no credentials are required to gain control of the bridge. The vulnerability is classified as CWE‑323: Weak Password Policy. Successful exploitation would permit an attacker to send arbitrary commands to the bridge, potentially affecting connected lighting and automation devices and providing a foothold for further network compromise.

Affected Systems

The affected product is the Philips Hue Bridge. Specific affected firmware versions are not enumerated in the provided data; however, any installation of the HomeKit Accessory Protocol that listens on TCP port 8080 and uses the default SRP nonce configuration is vulnerable. The issue was discovered in the configuration of the bridge’s SRP mechanism. There is no explicit version range listed, so all current releases that include the HomeKit feature should be treated as potentially affected.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalogue. Since the vulnerability is network‑adjacent, an attacker only needs to be on the same local network as the bridge. The attack requires no authentication or privileged access, making it easy to execute from a compromised device or a rogue client in the home network. Exploitation would proceed by connecting to port 8080, initiating an SRP session, and sending the static nonce value to gain unauthorized control.

Generated by OpenCVE AI on March 16, 2026 at 23:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Philips for a firmware update that addresses the static nonce issue; apply the update immediately if available.
  • If an update is not yet released, restrict access to port 8080 by configuring local firewall rules to allow traffic only from trusted devices.
  • Disable the HomeKit Accessory Protocol service if it is not needed for your setup to eliminate the attack surface.
  • Consider segmenting the home network to isolate the Hue Bridge from general network traffic, limiting the ability of network-adjacent attackers to reach the device.

Generated by OpenCVE AI on March 16, 2026 at 23:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Phillips
Phillips hue Bridge
Vendors & Products Phillips
Phillips hue Bridge

Fri, 13 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description Philips Hue Bridge HomeKit Accessory Protocol Static Nonce Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Philips Hue Bridge. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the SRP authentication mechanism in the HomeKit Accessory Protocol service, which listens on TCP port 8080 by default. The issue results from the use of a static nonce value. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-28451.
Title Philips Hue Bridge HomeKit Accessory Protocol Static Nonce Authentication Bypass Vulnerability
Weaknesses CWE-323
References
Metrics cvssV3_0

{'score': 8.1, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Phillips Hue Bridge
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-03-16T20:19:49.916Z

Reserved: 2026-03-04T19:42:45.880Z

Link: CVE-2026-3559

cve-icon Vulnrichment

Updated: 2026-03-16T20:19:45.406Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:19:51.820

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-3559

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:39:51Z

Weaknesses