Bookkeeping Service Providers

  • Accounting
  • Bookkeeping
  • US Taxation
  • Financial Planning
  • Accounting Software
  • Small Business Finance
You are here: Home / IOT / Report: Smart bulbs have a major security problem

Report: Smart bulbs have a major security problem

February 5, 2020 by cbn Leave a Comment

Many Philips Hue smart light bulbs have a firmware flaw that leads hackers into an entire network, Check Point Research found.

Your internet-connected light bulbs may be doing more than illuminating your home: They could also be serving as an open invitation to hackers. 

Security firm Check Point Research has released its findings that many Philips Hue smart light bulbs have a flaw in their firmware, which allows attackers to take control of an individual bulb, push malicious firmware to it, and spread other malicious software throughout a network.

If successful, an attacker utilizing this exploit can load malware onto the Internet of Things (IoT) bridge the target bulb connects to, and from there it can “infiltrate the target IP network from the bridge to spread ransomware or spyware,” Check Point said.

SEE: Amazon Alexa: Cheat sheet (free PDF) (TechRepublic)

How this smart bulb attack works

The actual exploit comes from the Zigbee low-power IoT protocol that Philips, and many other IoT product manufacturers, use for device communication. 

The Zigbee exploit was first reported by independent researchers in 2017, and Check Point said it used the same method in late 2019 to test the vulnerability. Two years on, and the exploit still works.

The actual attack, from start to network malware propagation, looks like this:

  1. An attacker gains control of an individual bulb using the Zigbee exploit, and pushes malicious malware to it.
  2. The attacker changes the bulbs color or brightness to trick the network owner into thinking the bulb is glitched. 
  3. The only way to fix a glitched smart bulb is to remove it from a network, and then re-add it. At this point the target has to do just that.
  4. Once re-added, the malicious firmware on the bulb triggers a massive data dump to the IoT control bridge. The data sent can include other malicious software, command and control software for future attacks against the network, and more. 
  5. With an IoT bridge now infected, the attacker is free to begin moving through the victim network.

Preventing a smart bulb attack

Check Point notified Philips of the exploit in late 2019, and the company has already released firmware updates for its Hue line of smart bulbs that should make them immune to the Zigbee exploit. 

With that in mind, it’s essential to remember that firmware (usually) doesn’t update itself. If you own Philips Hue smart bulbs, or any other smart bulbs for that matter, make sure you’re using the bulb app to regularly check for updates and be sure to always install them. 

It’s also worth mentioning that there’s a human element to the attack: It requires someone with access to the target network to reconnect a compromised bulb to complete the attack. 

Check Point mentioned that an infected bulb won’t show up in a list of devices because the attacker has already taken control of it, thereby removing it from the list of known devices.

If you encounter a situation where one of your smart bulbs is acting strangely and you can’t find it in a list of connected devices you may want to unplug it and reconnect it on a test network where none of your actual devices are at risk.

Cybersecurity Insider Newsletter

Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Sign up today

Also see

philips-hue-white-ambiance-4-pack-starter-kit-box-with-product-copy.jpg

Image: Philips

Share on FacebookShare on TwitterShare on Google+Share on LinkedinShare on Pinterest

Filed Under: IOT

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • May 2021
  • April 2021
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • March 2016

Recent Posts

  • FabCon Vienna: Build data-rich agents on an enterprise-ready foundation
  • Agent Factory: Connecting agents, apps, and data with new open standards like MCP and A2A
  • Azure mandatory multifactor authentication: Phase 2 starting in October 2025
  • Microsoft Cost Management updates—July & August 2025
  • Protecting Azure Infrastructure from silicon to systems

Recent Comments

    Categories

    • Accounting
    • Accounting Software
    • BlockChain
    • Bookkeeping
    • CLOUD
    • Data Center
    • Financial Planning
    • IOT
    • Machine Learning & AI
    • SECURITY
    • Uncategorized
    • US Taxation

    Categories

    • Accounting (145)
    • Accounting Software (27)
    • BlockChain (18)
    • Bookkeeping (205)
    • CLOUD (1,321)
    • Data Center (214)
    • Financial Planning (345)
    • IOT (260)
    • Machine Learning & AI (41)
    • SECURITY (620)
    • Uncategorized (1,284)
    • US Taxation (17)

    Subscribe Our Newsletter

     Subscribing I accept the privacy rules of this site

    Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in