Description

Philips Hue Bridge HomeKit hk_hap_pair_storage_put Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. Authentication is not required to exploit this vulnerability. The specific flaw exists within the hk_hap_pair_storage_put function of the HomeKit implementation, which listens on TCP port 8080 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-28469.

INFO

Published Date :

2026-03-13T20:37:01.412Z

Last Modified :

2026-03-16T20:20:23.327Z

Source :

zdi
AFFECTED PRODUCTS

The following products are affected by CVE-2026-3560 vulnerability.

Vendors Products
Philips
  • Hue Bridge V2
  • Hue Bridge V2 Firmware
Phillips
  • Hue Bridge
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-3560.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact