CVE-2023-4617

10.0 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to bypass authorization controls in the Govee Home mobile app, enabling them to control smart devices belonging to other users. Attackers can manipulate device identifiers in HTTP POST requests to send commands to unauthorized devices. This affects all Android and iOS users running Govee Home app versions before 5.9.

💻 Affected Systems

Products:
  • Govee Home mobile application
Versions: All versions before 5.9
Operating Systems: Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the mobile app's API communication, not in the devices themselves. All default installations are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could control all smart devices (lights, sensors, appliances) connected to vulnerable Govee Home accounts, potentially causing physical damage, privacy violations, or safety hazards by manipulating environmental controls.

🟠

Likely Case

Attackers would target specific users to control their smart home devices remotely, potentially causing nuisance, privacy invasion, or minor property damage through unauthorized device manipulation.

🟢

If Mitigated

With proper network segmentation and app updates, impact would be limited to isolated incidents affecting only outdated installations.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to intercept/modify HTTP traffic, but the vulnerability itself is simple to exploit once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.9 and later

Vendor Advisory: https://cert.pl/en/posts/2024/12/CVE-2023-4617/

Restart Required: Yes

Instructions:

1. Open Google Play Store or Apple App Store. 2. Search for 'Govee Home'. 3. Update to version 5.9 or later. 4. Restart the application after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Govee devices on separate VLAN or network segment to limit attack surface

Disable Remote Access

all

Turn off remote access features in Govee Home app settings

🧯 If You Can't Patch

  • Disconnect vulnerable Govee devices from the network entirely
  • Use firewall rules to block all outbound traffic from Govee Home app to external APIs

🔍 How to Verify

Check if Vulnerable:

Check Govee Home app version in app settings. If version is below 5.9, you are vulnerable.

Check Version:

Not applicable - check version in mobile app settings

Verify Fix Applied:

Confirm app version is 5.9 or higher in app settings after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual device control patterns
  • API requests with modified device/sku/type parameters
  • Failed authorization attempts followed by successful device control

Network Indicators:

  • HTTP POST requests to Govee APIs with manipulated device identifiers
  • Unusual traffic patterns to Govee cloud services

SIEM Query:

http.method:POST AND http.uri:"*govee*" AND (device_id:* OR sku:* OR type:*) AND NOT user_agent:"Govee Home/5.9+"

🔗 References

📤 Share & Export