CVE-2024-46040: n/a
IoT Haat Smart Plug IH-IN-16A-S IH-IN-16A-S v5.16.1 suffers from Insufficient Session Expiration. The lack of validation of the authentication token at the IoT Haat during the Access Point Pairing mode leads the attacker to replay the Wi-Fi packets and forcefully turn off the access point after the authentication token has expired.
AI Analysis
Technical Summary
CVE-2024-46040 is a vulnerability identified in the IoT Haat Smart Plug IH-IN-16A-S, specifically version 5.16.1. The root cause is insufficient session expiration validation during the device's Access Point Pairing mode. Normally, authentication tokens used to pair the device with Wi-Fi networks should expire and be invalidated to prevent reuse. However, this vulnerability allows an attacker to capture and replay expired authentication tokens (Wi-Fi packets) to the device. Because the device does not properly validate the token expiration, the attacker can force the smart plug to turn off its Wi-Fi access point. This results in a denial of service condition, as the device becomes unreachable over the network. The vulnerability is classified under CWE-613 (Insufficient Session Expiration). The CVSS v3.1 base score is 6.5 (medium severity), with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits have been reported in the wild yet, and no patches or firmware updates are currently linked. The vulnerability primarily affects the availability of the device's network functions and could disrupt IoT environments relying on these smart plugs for automation or monitoring.
Potential Impact
The primary impact of CVE-2024-46040 is denial of service through forced shutdown of the smart plug's Wi-Fi access point. This can disrupt IoT automation, energy management, or monitoring systems that depend on continuous connectivity of these devices. Organizations using these smart plugs in critical infrastructure, smart buildings, or industrial IoT deployments may experience operational interruptions. Although the vulnerability does not compromise confidentiality or integrity, the loss of availability can lead to cascading effects in environments where these devices control power or report sensor data. The ease of exploitation (no authentication or user interaction required) combined with the medium CVSS score indicates a moderate risk. However, the attack requires network proximity or access to the same wireless network segment, limiting remote exploitation. The absence of known exploits in the wild reduces immediate risk but does not eliminate potential future attacks. Overall, the impact is significant for environments with many deployed devices or where uptime is critical.
Mitigation Recommendations
To mitigate CVE-2024-46040, organizations should implement the following specific measures: 1) Restrict network access to the IoT Haat Smart Plugs by segmenting IoT devices on isolated VLANs or separate Wi-Fi networks to limit attacker proximity. 2) Monitor network traffic for replayed authentication tokens or unusual Wi-Fi packet patterns during Access Point Pairing mode. 3) Disable Access Point Pairing mode when not actively pairing devices to reduce attack surface. 4) Engage with the device vendor to obtain firmware updates or patches addressing the session expiration validation flaw as soon as they become available. 5) Employ network intrusion detection systems (NIDS) capable of detecting replay attacks or anomalous Wi-Fi activity. 6) Maintain an inventory of affected devices and plan for phased replacement if vendor support is unavailable. 7) Educate staff on the risks of IoT device vulnerabilities and enforce strict physical and network access controls. These targeted steps go beyond generic advice by focusing on network segmentation, active monitoring, and operational controls specific to the vulnerability's exploitation vector.
Affected Countries
United States, China, Germany, Japan, South Korea, United Kingdom, France, India, Canada, Australia
CVE-2024-46040: n/a
Description
IoT Haat Smart Plug IH-IN-16A-S IH-IN-16A-S v5.16.1 suffers from Insufficient Session Expiration. The lack of validation of the authentication token at the IoT Haat during the Access Point Pairing mode leads the attacker to replay the Wi-Fi packets and forcefully turn off the access point after the authentication token has expired.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-46040 is a vulnerability identified in the IoT Haat Smart Plug IH-IN-16A-S, specifically version 5.16.1. The root cause is insufficient session expiration validation during the device's Access Point Pairing mode. Normally, authentication tokens used to pair the device with Wi-Fi networks should expire and be invalidated to prevent reuse. However, this vulnerability allows an attacker to capture and replay expired authentication tokens (Wi-Fi packets) to the device. Because the device does not properly validate the token expiration, the attacker can force the smart plug to turn off its Wi-Fi access point. This results in a denial of service condition, as the device becomes unreachable over the network. The vulnerability is classified under CWE-613 (Insufficient Session Expiration). The CVSS v3.1 base score is 6.5 (medium severity), with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits have been reported in the wild yet, and no patches or firmware updates are currently linked. The vulnerability primarily affects the availability of the device's network functions and could disrupt IoT environments relying on these smart plugs for automation or monitoring.
Potential Impact
The primary impact of CVE-2024-46040 is denial of service through forced shutdown of the smart plug's Wi-Fi access point. This can disrupt IoT automation, energy management, or monitoring systems that depend on continuous connectivity of these devices. Organizations using these smart plugs in critical infrastructure, smart buildings, or industrial IoT deployments may experience operational interruptions. Although the vulnerability does not compromise confidentiality or integrity, the loss of availability can lead to cascading effects in environments where these devices control power or report sensor data. The ease of exploitation (no authentication or user interaction required) combined with the medium CVSS score indicates a moderate risk. However, the attack requires network proximity or access to the same wireless network segment, limiting remote exploitation. The absence of known exploits in the wild reduces immediate risk but does not eliminate potential future attacks. Overall, the impact is significant for environments with many deployed devices or where uptime is critical.
Mitigation Recommendations
To mitigate CVE-2024-46040, organizations should implement the following specific measures: 1) Restrict network access to the IoT Haat Smart Plugs by segmenting IoT devices on isolated VLANs or separate Wi-Fi networks to limit attacker proximity. 2) Monitor network traffic for replayed authentication tokens or unusual Wi-Fi packet patterns during Access Point Pairing mode. 3) Disable Access Point Pairing mode when not actively pairing devices to reduce attack surface. 4) Engage with the device vendor to obtain firmware updates or patches addressing the session expiration validation flaw as soon as they become available. 5) Employ network intrusion detection systems (NIDS) capable of detecting replay attacks or anomalous Wi-Fi activity. 6) Maintain an inventory of affected devices and plan for phased replacement if vendor support is unavailable. 7) Educate staff on the risks of IoT device vulnerabilities and enforce strict physical and network access controls. These targeted steps go beyond generic advice by focusing on network segmentation, active monitoring, and operational controls specific to the vulnerability's exploitation vector.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-09-11T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cf6b7ef31ef0b56a876
Added to database: 2/25/2026, 9:43:18 PM
Last enriched: 2/28/2026, 7:13:08 AM
Last updated: 4/12/2026, 5:05:56 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.