Authentication Bypass in Philips Hue Bridge by Philips
CVE-2026-3559

8.1HIGH

Key Information:

Vendor

Philips

Vendor
CVE Published:
13 March 2026

What is CVE-2026-3559?

A significant vulnerability found in the Philips Hue Bridge allows network-adjacent attackers to bypass authentication mechanisms. This flaw resides in the SRP authentication configuration used within the HomeKit Accessory Protocol service. Exploiting this vulnerability, which is compounded by a static nonce value, enables attackers to gain unauthorized access to the device without the need for authentication. The HomeKit Accessory Protocol typically listens on TCP port 8080, creating an avenue for exploitation. This presents serious security implications for users' connected home environments.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Hue Bridge 1.73.1973146020

References

CVSS V3.0

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.