Description
Philips Hue Bridge hk_hap characteristics Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.

The specific flaw exists within the handling of PUT requests to the characteristics endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-28479.
Published: 2026-03-13
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a heap‑based buffer overflow in the hk_hap characteristics endpoint of Philips Hue Bridge. An attacker can send oversized data in a PUT request to the characteristics endpoint, bypassing the existing authentication mechanism due to improper validation of the length of user‑supplied data. This flaw (CWE‑122) allows the attacker to execute arbitrary code in the device’s context, resulting in a full compromise of confidentiality, integrity, and availability.

Affected Systems

The affected product is Philips Hue Bridge. No specific firmware or model versions are listed in the provided data, so all current installations may be vulnerable until an official patch is released.

Risk and Exploitability

The CVSS score of 8.0 indicates high severity. The EPSS score of less than 1% suggests a relatively low probability of exploitation at the moment, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires an adversary to be network‑adjacent to the Hue Bridge and to send a crafted PUT request to the characteristics endpoint. Authentication can be bypassed, so the attack vector is local network, pre‑authenticated, and relatively straightforward for a nearby attacker.

Generated by OpenCVE AI on March 16, 2026 at 23:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest official firmware update for Philips Hue Bridge as soon as it becomes available.
  • Restrict network access to the Hue Bridge by placing it on a separate VLAN or using firewall rules to allow only trusted devices to communicate with it.
  • Monitor Hue Bridge logs and network traffic for unusual PUT requests to the characteristics endpoint, and investigate any suspicious activity promptly.

Generated by OpenCVE AI on March 16, 2026 at 23:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Phillips
Phillips hue Bridge
Vendors & Products Phillips
Phillips hue Bridge

Fri, 13 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description Philips Hue Bridge hk_hap characteristics Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of PUT requests to the characteristics endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-28479.
Title Philips Hue Bridge hk_hap characteristics Heap-based Buffer Overflow Remote Code Execution Vulnerability
Weaknesses CWE-122
References
Metrics cvssV3_0

{'score': 8, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Phillips Hue Bridge
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-03-16T20:21:04.470Z

Reserved: 2026-03-04T19:42:53.419Z

Link: CVE-2026-3561

cve-icon Vulnrichment

Updated: 2026-03-16T20:20:59.825Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:19:52.197

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-3561

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:39:49Z

Weaknesses