CVE-2022-39064

Published on: Not Yet Published

Last Modified on: 10/18/2022 08:15:00 PM UTC

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

Certain versions of Tradfri Led1732g11 from Ikea contain the following vulnerability:

An attacker sending a single malformed IEEE 802.15.4 (Zigbee) frame makes the TRÅDFRI bulb blink, and if they replay (i.e. resend) the same frame multiple times, the bulb performs a factory reset. This causes the bulb to lose configuration information about the Zigbee network and current brightness level. After this attack, all lights are on with full brightness, and a user cannot control the bulbs with either the IKEA Home Smart app or the TRÅDFRI remote control. The malformed Zigbee frame is an unauthenticated broadcast message, which means all vulnerable devices within radio range are affected. CVSS 3.1 Base Score 7.1 vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

  • CVE-2022-39064 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.
  • Affected Vendor/Software: URL Logo Ikea - TRÅDFRI smart lighting system version < 2.0.029 >

CVSS3 Score: 8.1 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
ADJACENT_NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE HIGH HIGH

CVE References

Description Tags Link
CyRC Vulnerability Advisory: CVE-2022-39064 IKEA TRÅDFRI smart lighting | Synopsys www.synopsys.com
text/html
URL Logo MISC www.synopsys.com/blogs/software-security/cyrc-advisory-ikea-tradfri-smart-lighting/

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Hardware Device InfoIkeaTradfri Led1732g11-AllAllAll
Operating
System
IkeaTradfri Led1732g11 Firmware-AllAllAll
  • cpe:2.3:h:ikea:tradfri_led1732g11:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ikea:tradfri_led1732g11_firmware:-:*:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @buaqbot CyRC Vulnerability Advisory: CVE-2022-39064 IKEA TRÅDFRI smart lighting ift.tt/vFazq5J ift.tt/jTxmHB1 2022-10-05 13:19:08
Twitter Icon @ohhara_shiojiri "an attacker could advantage of two vulnerabilities (tracked under CVE-2022-39064 and CVE-2022-39065) in the Ikea T… twitter.com/i/web/status/1… 2022-10-06 04:23:28
Twitter Icon @straussjesus CyRC Vulnerability Advisory: CVE-2022-39064 IKEA TRÅDFRI smart lighting bit.ly/3C6HOwA 2022-10-06 14:23:23
Twitter Icon @gikogang イケアのスマート電球を点滅させて、隣人に家が幽霊だと思わせる ※CVE番号あり > バグに関するいくつかの記事で、研究者は Tradfri スマート電球の脆弱性である CVE-2022-39064 が、ライトを点滅させる単一の… twitter.com/i/web/status/1… 2022-10-08 08:15:03
Twitter Icon @foxbook ※元ソース(脆弱性)はコチラ 「CyRC 脆弱性アドバイザリ: CVE-2022-39064 IKEA TRÅDFRI スマート照明」 synopsys.com/blogs/software… 2022-10-08 20:54:21
Twitter Icon @DavidJo07641320 CyRC Vulnerability Advisory: CVE-2022-39064 IKEA TRÅDFRI smart lighting bit.ly/3RRiPTQ 2022-10-10 14:38:01
Reddit Logo Icon /r/CKsTechNews Synopsys CyRC Vulnerability Advisory: CVE-2022-39064 IKEA TRÅDFRI smart lighting 2022-10-07 08:41:54
Reddit Logo Icon /r/netcve CVE-2022-39064 2022-10-14 16:39:00
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report