Categories: Technology

Update the firmware of Philips Hue bulbs: risk of hacker attack

Check Point security researchers have identified a smart bulb vulnerability Philips Hue which can lead an attacker to conduct an attack for take control of your home network of the victim. The vulnerability affects the use of the ZigBee protocol by Philips Hue bulbs.

Check Point informed Signify, the parent company of Philips Hue, sharing the details of the vulnerability and thus giving way to create a firmware that is already being distributed so that it is possible to update all the Philips Hue bulbs affected by the problem. In compliance with the protocol that Check Point adopts for the disclosure of security vulnerabilities, the full details of the vulnerability will be made public within the next few weeks to allow for the adequate dissemination and distribution of the corrective patch to users.

ZigBee a fairly widespread communication protocol in the IoT / smarthome environment and which allows devices to communicate easily with each other. CheckPoint explains that an attacker could use a ZigBee antenna and take control of a Philips Hue light bulb to simulate a malfunction and remove it from the network of devices, not before inserting malware into the light bulb itself. At this point if the user tries to bring the bulb back into the network using the Hue app, the malware can spread from the bulb to the Hue Bridge (the hardware control device of the various Philips Hue elements), which in turn connected to the home router. Once the malware reaches Hue Bridge, the attacker has the option of accessing the rest of the network with the possibility of further attacks.

Those who are in possession of Philips Hue bulbs are therefore advised to access the Hue app and check for updates and install them as soon as possible – although in most cases automatic updates may be active. The firmware version that addresses the vulnerability is 1935144040

Yaniv Balmas, researcher for Check Point Research, warns: "Many of us are aware that IoT devices can pose a security risk, but research shows that even the most ordinary and 'stupid' devices like light bulbs can be exploited by hackers and used to take over networks or install malware. "

It is currently unclear whether the same technique can be used to attack other Zigbee-based smart home devices, a protocol used, among others, by Amazon Echo Plus, Belkin WeMo and the Tradfri line of Ikea devices.

Miners Hashrate

Recent Posts

Mining RTX 3070 at NiceHash: Overclocking, tuning, profitability, consumption

Mining on RTX 3070. Overclocking, tuning, profitability, consumption: If you are interested in finding more…

6 months ago

Mining GTX 1660, 1660 Ti, 1660 Super: Overclocking, settings, consumption

Mining with GTX 1660, 1660 Ti, 1660 Super. Overclocking, settings, consumption, profitability, comparisons - If…

6 months ago

Mining RTX 2070 and 2070 Super: Overclocking, profitability, consumption

Mining with RTX 2070 and 2070 Super. Overclocking, profitability, consumption, comparison What the RTX 2070…

6 months ago

Mining with RTX 3060, 3060 Ti. Limitations, overclocking, settings, consumption

Mining with RTX 3060, 3060 Ti. Limitations, overclocking, settings, consumption, profitability, comparison Let's look at…

6 months ago

Alphacool Eisblock Aurora Acryl GPX-A Sapphire – test: 2.8 GHz++ are not an issue

Alphacool Eisblock Aurora Acryl GPX-A (2022) with Sapphire Radeon RX 6950 XT Nitro+ Pure in…

6 months ago

Corporate Crypto Strategies 4.0: Leading with Bitcoin Expertise

In the ever-evolving landscape of business strategy, Bitcoin has emerged as a pivotal asset. With…

6 months ago

This website uses cookies.


Notice: ob_end_flush(): failed to send buffer of zlib output compression (1) in /home/gamefeve/bitcoinminershashrate.com/wp-includes/functions.php on line 5420

Notice: ob_end_flush(): failed to send buffer of zlib output compression (1) in /home/gamefeve/bitcoinminershashrate.com/wp-includes/functions.php on line 5420