First published: Thu Nov 14 2019(Updated: )
On Signify Philips Taolight Smart Wi-Fi Wiz Connected LED Bulb 9290022656 devices, an unprotected API lets remote users control the bulb's operation. Anyone can turn the bulb on or off, or change its color or brightness remotely. There is no authentication or encryption to use the control API. The only requirement is that the attacker have network access to the bulb.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Philips Taolight Smart Wi-fi Wiz Connected Led Bulb 9290022656 Firmware | ||
Philips Taolight Smart Wi-Fi Wiz Connected LED Bulb 9290022656 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18980 is a vulnerability found in Signify Philips Taolight Smart Wi-Fi Wiz Connected LED Bulb 9290022656 devices that allows remote users to control the bulb without authentication or encryption.
CVE-2019-18980 allows anyone to remotely turn the bulb on or off, or change its color or brightness, with no authentication or encryption.
At the moment, there is no official fix available for CVE-2019-18980.
The severity of CVE-2019-18980 is high with a CVSS score of 7.5.
You can find more information about CVE-2019-18980 at this reference: [https://blog.dammitly.net/2019/10/cheap-hackable-wifi-light-bulbs-or-iot.html](https://blog.dammitly.net/2019/10/cheap-hackable-wifi-light-bulbs-or-iot.html)