Researchers at the Black Duck Cybersecurity Research Center (CyRC) have discovered a vulnerability affecting availability in the IKEA TRÅDFRI smart lighting system. A single malformed IEEE 802.15.4 (Zigbee) frame makes the TRÅDFRI gateway unresponsive, such that connected lighting cannot be controlled with the IKEA Home Smart app and TRÅDFRI remote control.
The malformed Zigbee frame is an unauthenticated broadcast message, which means all vulnerable devices within radio range are affected.
To recover from this attack, a user could manually power cycle the gateway. However, an attacker could reproduce the attack at any time.
CVE-2022-39065 is related to another availability vulnerability that was recently discovered in the IKEA TRÅDFRI smart lighting system (CVE-2022-39064). Read our latest blog post to learn more.
IKEA Trådfri Gateway type E1526 version 1.17.44 and earlier
CVSS 3.1 base score: 6.5
CVSS 3.1 vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Upgrade the gateway software to version 1.19.26 or later.
This vulnerability was discovered by CyRC researchers Kari Hulkko and Tuomo Untinen using the Defensics® fuzz testing tool.
FIRST.Org, Inc (FIRST) is a non-profit organization based out of US that owns and manages CVSS. It is not required to be a member of FIRST to utilize or implement CVSS but FIRST does require any individual or organization give appropriate attribution while using CVSS. FIRST also states that any individual or organization that publishes scores follow the guideline so that anyone can understand how the score was calculated.