CVE-2022-31277

8.8 HIGH

📋 TL;DR

CVE-2022-31277 is a replay attack vulnerability in Xiaomi Lamp 1 smart bulbs that allows attackers to capture and reuse authentication requests. This bypasses access controls, enabling unauthorized control of lighting functions. Users of Xiaomi Lamp 1 v2.0.4_0066 are affected.

💻 Affected Systems

Products:
  • Xiaomi Lamp 1
Versions: v2.0.4_0066
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires network access to the device; typically affects devices connected to local networks without proper segmentation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain persistent control over lighting systems, potentially enabling physical safety risks, privacy invasion through lighting patterns, or integration into botnets for DDoS attacks.

🟠

Likely Case

Unauthorized users toggle lights on/off, change brightness/colors, or disrupt scheduled lighting operations, causing annoyance and potential energy waste.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to isolated lighting control without access to other network resources.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires capturing legitimate POST requests via network sniffing, then replaying them; tools like Wireshark and curl can be used.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: Not publicly available

Restart Required: No

Instructions:

No official patch available; refer to workarounds and risk reduction steps.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Xiaomi Lamp devices on a separate VLAN or network segment to limit attack surface.

Disable Remote Access

all

Ensure devices are not exposed to the internet via port forwarding or UPnP.

🧯 If You Can't Patch

  • Monitor network traffic for repeated POST requests to device endpoints.
  • Consider replacing vulnerable devices with updated models if available.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via Xiaomi app; if version is v2.0.4_0066, device is vulnerable.

Check Version:

Check through Xiaomi Mi Home app device settings.

Verify Fix Applied:

No official fix available; verify workarounds by testing network isolation and access controls.

📡 Detection & Monitoring

Log Indicators:

  • Repeated POST requests to device IP on port 54321 from unexpected sources.

Network Indicators:

  • Unusual traffic patterns to/from smart bulb devices, especially replay of similar requests.

SIEM Query:

source_ip=* AND dest_port=54321 AND http_method=POST AND count>10 within 1m

🔗 References

📤 Share & Export