LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-3558 - Vulnerability Analysis

HighCVSS: 8.1

Last Updated: March 16, 2026

Philips Hue Bridge - Authentication Bypass

Published: March 16, 2026Updated: March 16, 2026

Overview

Philips Hue Bridge contains an authentication bypass caused by lack of authentication in HomeKit Accessory Protocol service on TCP port 8080, letting network-adjacent attackers bypass authentication, exploit requires no authentication.

Severity & Score

Severity: High
CVSS Score: 8.1
EPSS Score: 2.5%(Probability of exploitation in next 30 days)

Impact

Network-adjacent attackers can bypass authentication, potentially gaining unauthorized access to the device.

Mitigation

Update to the latest version of Philips Hue Bridge firmware.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 16, 2026

🟠 CVE-2026-3558 - High (8.1) Philips Hue Bridge HomeKit Accessory Protocol Transient Pairing Mode Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Philips Hue Bridge. Authentication... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-3558/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-3558
Severity
High
CVSS Score
8.1
Type
broken_authentication
Status
unconfirmed
EPSS
2.5%
Social Posts
1

CWE

  • CWE-306

CVSS Metrics

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS Score

2.5%Probability of exploitation in the next 30 days