Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3559: CWE-323: Reusing a Nonce, Key Pair in Encryption in Philips Hue Bridge

0
High
VulnerabilityCVE-2026-3559cvecve-2026-3559cwe-323
Published: Fri Mar 13 2026 (03/13/2026, 20:36:57 UTC)
Source: CVE Database V5
Vendor/Project: Philips
Product: Hue Bridge

Description

CVE-2026-3559 is a high-severity vulnerability in the Philips Hue Bridge affecting version 1. 73. 1973146020. It involves a static nonce reuse flaw in the SRP authentication mechanism of the HomeKit Accessory Protocol service, which listens on TCP port 8080. This flaw allows network-adjacent attackers to bypass authentication without any user interaction or prior credentials. Exploitation can lead to full compromise of the affected device's confidentiality and integrity, enabling unauthorized control over smart home lighting systems. Although no known exploits are currently in the wild, the vulnerability's ease of exploitation and impact make it a significant risk. Organizations using Philips Hue Bridges in smart home or IoT deployments should prioritize mitigation. No official patches are currently available, so network-level controls and device isolation are critical interim defenses. Countries with high adoption of Philips Hue products and smart home ecosystems, such as the United States, Germany, United Kingdom, Netherlands, and Australia, face the greatest risk.

AI-Powered Analysis

AILast updated: 03/13/2026, 21:14:35 UTC

Technical Analysis

CVE-2026-3559 is a vulnerability identified in the Philips Hue Bridge, specifically version 1.73.1973146020, involving the reuse of a static nonce in the SRP (Secure Remote Password) authentication mechanism within the HomeKit Accessory Protocol service. This service typically listens on TCP port 8080. The flaw is classified under CWE-323, which concerns the reuse of nonces or key pairs in encryption processes. The use of a static nonce undermines the cryptographic protocol's security guarantees, allowing an attacker positioned on the same network segment (network-adjacent) to bypass authentication controls without needing any credentials or user interaction. The attacker can exploit this weakness to impersonate legitimate devices or users, gaining unauthorized access to the Philips Hue Bridge and potentially controlling connected smart lighting devices. This can lead to unauthorized disclosure of sensitive information and manipulation of device states, impacting both confidentiality and integrity. The vulnerability was assigned a CVSS v3.0 base score of 8.1, reflecting its high severity due to low attack complexity, no required privileges, and no user interaction. While no public exploits have been reported yet, the vulnerability was disclosed by the Zero Day Initiative (ZDI) under identifier ZDI-CAN-28451. No patches have been released at the time of this report, increasing the urgency for alternative mitigation strategies.

Potential Impact

The impact of CVE-2026-3559 is significant for organizations and individuals relying on Philips Hue Bridges for smart home automation. Successful exploitation allows attackers to bypass authentication entirely, granting unauthorized control over lighting systems. This can lead to privacy violations, as attackers may monitor device states or infer user presence and behavior patterns. Integrity is compromised as attackers can manipulate lighting settings, potentially causing disruptions or creating safety concerns (e.g., disabling lights during critical times). Although availability is not directly impacted, the loss of control and trust in the smart home environment can have cascading effects on user confidence and operational stability. For enterprises deploying Philips Hue Bridges in office or commercial environments, the vulnerability could facilitate lateral movement or serve as a foothold for further network intrusion. Given the ease of exploitation and the critical role of smart home devices in modern environments, the threat poses a broad risk to confidentiality and integrity across affected deployments worldwide.

Mitigation Recommendations

Since no official patches are currently available for CVE-2026-3559, organizations and users should implement the following specific mitigation measures: 1) Isolate Philips Hue Bridges on segmented network zones or VLANs separate from critical infrastructure to limit attacker access. 2) Restrict access to TCP port 8080 on the Hue Bridge using firewall rules or network access control lists (ACLs) to prevent unauthorized network-adjacent attackers from reaching the vulnerable service. 3) Monitor network traffic for unusual connection attempts or patterns targeting the HomeKit Accessory Protocol service. 4) Disable or limit remote access features to the Hue Bridge where possible, reducing exposure to external networks. 5) Regularly audit and update smart home device firmware and configurations as vendors release patches or mitigations. 6) Employ network intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts related to SRP authentication anomalies. 7) Educate users on the risks of connecting smart home devices to untrusted networks. These targeted steps go beyond generic advice by focusing on network-level controls and monitoring specific to the vulnerable service and protocol.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2026-03-04T19:42:45.880Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69b47ac82f860ef943b21738

Added to database: 3/13/2026, 8:59:52 PM

Last enriched: 3/13/2026, 9:14:35 PM

Last updated: 3/13/2026, 11:20:42 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses