Researchers have demonstrated how an attacker could take over control of light bulbs in the Ikea Trådfri smart lighting system, ultimately turning the bulbs up to full brightness — and users can’t turn them down through the app or the remote control.
Cybersecurity analysts at Synopsys CyRC found that if a threat actor re-sent the same malformed Zigbee frame (IEEE 802.15.4) over and over again, an attacker could advantage of two vulnerabilities (tracked under CVE-2022-39064 and CVE-2022-39065) in the Ikea Trådfri smart lighting system.
“The malformed Zigbee frame is an unauthenticated broadcast message, which means all vulnerable devices within radio range are affected,” the Synopsys report explained.
The result of the Internet of things (IoT) security flaw is a lighting system factory reset where the user is stripped of control over their bulbs both through the Ikea Smart Home application as well as the companion Trådfri remote control, Syopsys added. It starts with a flicker and then leaves the lights on full, permanently.
“To recover from this attack, a user could manually power cycle the gateway,” the team said. “However, an attacker could reproduce the attack at any time.”
Synopsys disclosed the smart lighting vulnerabilities to Ikea in June 2021 and Ikea released a fix in February 2022, the report added.