Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3588: CWE-918 Server-Side Request Forgery (SSRF) in ikea dirigera

0
High
VulnerabilityCVE-2026-3588cvecve-2026-3588cwe-918
Published: Mon Mar 09 2026 (03/09/2026, 15:41:21 UTC)
Source: CVE Database V5
Vendor/Project: ikea
Product: dirigera

Description

A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 allows an attacker to exfiltrate private keys by sending a crafted request.

AI-Powered Analysis

AILast updated: 03/09/2026, 16:19:09 UTC

Technical Analysis

CVE-2026-3588 is a Server-Side Request Forgery (SSRF) vulnerability identified in IKEA Dirigera version 2.866.4, a smart home hub device. SSRF vulnerabilities occur when an attacker can abuse a server to send unauthorized requests to internal or external systems. In this case, the vulnerability allows an attacker with high privileges (authenticated user) to craft requests that trick the Dirigera device into making unintended network calls. These calls can be leveraged to exfiltrate private cryptographic keys stored on the device, which are critical for securing communications and device integrity. The vulnerability is classified under CWE-918, indicating improper restriction of outgoing requests. The CVSS 3.1 score of 7.5 reflects a high severity with attack vector as adjacent network (AV:A), low attack complexity (AC:L), requiring privileges (PR:H), no user interaction (UI:N), and a scope change (S:C). The impact on confidentiality is high due to key leakage, while integrity and availability impacts are lower but present. No public exploits have been reported yet, but the risk remains significant due to the sensitive nature of the data exposed. The vulnerability affects the IKEA Dirigera product line, which is used globally in smart home environments, making it a concern for both consumers and enterprises deploying these devices in their networks.

Potential Impact

The primary impact of CVE-2026-3588 is the compromise of confidentiality through the exfiltration of private cryptographic keys. These keys are essential for securing communications, authenticating devices, and maintaining the integrity of the smart home ecosystem. If an attacker obtains these keys, they could potentially impersonate devices, decrypt sensitive communications, or manipulate device behavior. This could lead to unauthorized access to the smart home environment, privacy violations, and further lateral movement within a network. Although the vulnerability requires authenticated access, the high privileges needed mean that insider threats or compromised credentials could be exploited. The availability impact is limited but present, as manipulation of keys could disrupt device operations. Given the widespread adoption of IKEA Dirigera in smart homes, the vulnerability could affect millions of users worldwide, potentially undermining trust in smart home security and exposing sensitive personal data.

Mitigation Recommendations

1. Apply patches or firmware updates from IKEA as soon as they become available to address the SSRF vulnerability directly. 2. Restrict network access to the Dirigera device management interfaces to trusted networks and users only, minimizing the risk of unauthorized authenticated access. 3. Implement strict input validation and sanitization on any user-supplied data that could be used to craft SSRF requests, ensuring that internal IP ranges and sensitive endpoints are not accessible. 4. Employ network segmentation to isolate smart home hubs from critical internal networks to limit lateral movement if compromise occurs. 5. Monitor device logs and network traffic for unusual outbound requests originating from the Dirigera device, which could indicate exploitation attempts. 6. Enforce strong authentication mechanisms and regularly rotate credentials to reduce the risk of privilege escalation. 7. Educate users on the risks of credential compromise and encourage secure password practices. 8. Consider deploying network-level protections such as egress filtering to block unauthorized internal requests from the device.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Nozomi
Date Reserved
2026-03-05T09:45:23.765Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69aef0552904315ca31e4b3e

Added to database: 3/9/2026, 4:07:49 PM

Last enriched: 3/9/2026, 4:19:09 PM

Last updated: 3/9/2026, 7:06:57 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses