CVE-2022-39064

An attacker sending a single malformed IEEE 802.15.4 (Zigbee) frame makes the TRÅDFRI bulb blink, and if they replay (i.e. resend) the same frame multiple times, the bulb performs a factory reset. This causes the bulb to lose configuration information about the Zigbee network and current brightness level. After this attack, all lights are on with full brightness, and a user cannot control the bulbs with either the IKEA Home Smart app or the TRÅDFRI remote control. The malformed Zigbee frame is an unauthenticated broadcast message, which means all vulnerable devices within radio range are affected. CVSS 3.1 Base Score 7.1 vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ikea:tradfri_led1732g11_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ikea:tradfri_led1732g11:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:17

Type Values Removed Values Added
References () https://www.synopsys.com/blogs/software-security/cyrc-advisory-ikea-tradfri-smart-lighting/ - Third Party Advisory () https://www.synopsys.com/blogs/software-security/cyrc-advisory-ikea-tradfri-smart-lighting/ - Third Party Advisory

Information

Published : 2022-10-14 16:15

Updated : 2024-11-21 07:17


NVD link : CVE-2022-39064

Mitre link : CVE-2022-39064

CVE.ORG link : CVE-2022-39064


JSON object : View

Products Affected

ikea

  • tradfri_led1732g11_firmware
  • tradfri_led1732g11
CWE
CWE-241

Improper Handling of Unexpected Data Type

NVD-CWE-Other