CVE-2026-3558

HIGH

Philips Hue Bridge - Auth Bypass

Title source: llm
STIX 2.1

Description

Philips Hue Bridge HomeKit Accessory Protocol Transient Pairing Mode Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Philips Hue Bridge. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the HomeKit Accessory Protocol service, which listens on TCP port 8080 by default. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-28374.

Scores

CVSS v3 8.1
EPSS 0.0012
EPSS Percentile 30.6%
Attack Vector ADJACENT_NETWORK
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-306
Status published
Products (2)
Philips/Hue Bridge 1.73.1973146020
philips/hue_bridge_v2_firmware < 1975170000
Published Mar 16, 2026
Tracked Since Mar 16, 2026