Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0842: Missing Authentication in Flycatcher Toys smART Sketcher

0
Medium
VulnerabilityCVE-2026-0842cvecve-2026-0842
Published: Sun Jan 11 2026 (01/11/2026, 08:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Flycatcher Toys
Product: smART Sketcher

Description

A flaw has been found in Flycatcher Toys smART Sketcher up to 2.0. This affects an unknown part of the component Bluetooth Low Energy Interface. This manipulation causes missing authentication. The attack can only be done within the local network. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:45:51 UTC

Technical Analysis

CVE-2026-0842 identifies a security vulnerability in Flycatcher Toys smART Sketcher version 2.0, specifically within its Bluetooth Low Energy (BLE) interface. The vulnerability arises due to missing authentication controls in the BLE communication component, allowing an attacker on the same local network to interact with the device without any authentication or user interaction. This lack of authentication means that an attacker can potentially send unauthorized commands or manipulate the device’s behavior remotely over BLE. The attack vector is limited to local network access, which restricts exploitation to attackers physically or logically close to the victim device. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the moderate impact and ease of exploitation without privileges or user interaction. The vendor was notified early but has not issued any patches or advisories, and no official remediation is currently available. The exploit details have been published publicly, increasing the risk of exploitation. The vulnerability could lead to unauthorized control over the toy, potentially impacting the confidentiality and integrity of data exchanged or stored by the device. The absence of authentication in BLE communications is a critical design flaw that undermines the security of the device in local network environments.

Potential Impact

The primary impact of CVE-2026-0842 is unauthorized access and control over the Flycatcher Toys smART Sketcher device via its BLE interface. This could allow attackers to manipulate device functions, potentially causing unexpected behavior or data leakage. For consumers, this may lead to privacy violations or safety concerns, especially if the toy collects or transmits sensitive information. For organizations such as schools, daycare centers, or retail environments using these devices, the vulnerability could be exploited to disrupt operations or gain a foothold in local networks. Although the attack requires local network access, environments with weak network segmentation or guest Wi-Fi access are particularly vulnerable. The lack of vendor response and absence of patches prolong the exposure window, increasing the risk of exploitation. While no active exploits are reported in the wild, the public availability of exploit code raises the likelihood of opportunistic attacks. Overall, the vulnerability undermines trust in IoT devices used by children and families and highlights the importance of secure BLE implementations.

Mitigation Recommendations

1. Restrict local network access to the Flycatcher Toys smART Sketcher devices by implementing strong network segmentation and access controls, isolating IoT devices from critical infrastructure. 2. Disable Bluetooth functionality on the device when not in use to minimize the attack surface. 3. Monitor local network traffic for unusual BLE activity or unauthorized connection attempts targeting the device. 4. Educate users and administrators about the risks of connecting these devices to untrusted networks, especially public or guest Wi-Fi. 5. If possible, replace affected devices with newer models or alternatives that implement proper BLE authentication. 6. Advocate for vendor engagement and request official patches or firmware updates to address the authentication flaw. 7. Employ BLE security best practices in the environment, such as using BLE pairing with authentication and encryption where supported. 8. Maintain an inventory of all IoT devices and regularly assess their security posture to identify and mitigate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-10T09:52:57.730Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69635e11da2266e83844dcd4

Added to database: 1/11/2026, 8:23:45 AM

Last enriched: 2/23/2026, 10:45:51 PM

Last updated: 3/24/2026, 3:04:55 PM

Views: 170

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses