{"id":56470,"date":"2024-07-03T16:24:09","date_gmt":"2024-07-03T16:24:09","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/"},"modified":"2024-07-03T16:24:09","modified_gmt":"2024-07-03T16:24:09","slug":"traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/","title":{"rendered":"Traeger security bugs bad news for grillers with neighborly beef"},"content":{"rendered":"<p>Keen meatheads better hope they haven&#8217;t angered any cybersecurity folk before allowing their Traeger grills to update because a new high-severity vulnerability could be used for all kinds of high jinks.<\/p>\n<p>With summer in full swing in the northern hemisphere, it means BBQ season is upon us, and with Traeger being one of the most trusted brands in grilling and smoking, there&#8217;s a good chance that many backyard cookouts could be ruined if crafty crims have their way.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2021\/04\/20\/shutterstock_onion_rings.jpg?x=174&amp;amp;y=115&amp;amp;crop=1\" width=\"174\" height=\"115\" alt=\"People eating onion rings with other food in a pub setting\"><\/p>\n<h2 title=\"Cisco Talos discovers flaws in air fryer, connected chip cooker firm fails to fix\">We need to talk about criminal adversaries who want you to eat undercooked onion rings<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2021\/04\/20\/cisco_talos_corosi_fryer_flaws\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Nick Cerne, security consultant at Bishop Fox, <a target=\"_blank\" href=\"https:\/\/bishopfox.com\/blog\/traeger-wifi-controller-advisory\" rel=\"nofollow noopener\">discovered<\/a> a few weaknesses in certain Traeger grills, ones that have the Traeger Grill D2 Wi-Fi Controller installed \u2013 an embedded device allowing a grill to be controlled using a mobile app.<\/p>\n<p>Successful exploits could allow a remote attacker to execute day-ruining commands such as temperature change controls or shutting down the grill altogether.<\/p>\n<p>Some meat enthusiasts will meticulously time their cooks for perfect, smoky, fall-off-the-bone meat, with some cooks spanning hours, deep into the early morning before leaving the final product to rest.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/research&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZoWioTUHRuCQSZLcnSBHvwAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/research&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZoWioTUHRuCQSZLcnSBHvwAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Should the temperature be adjusted mid-cook from a gentle low flame to searing heat, it could be the difference between a backyard gathering for the ages and the worst day of a host&#8217;s year.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/research&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZoWioTUHRuCQSZLcnSBHvwAAANg&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/research&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZoWioTUHRuCQSZLcnSBHvwAAANg&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/research&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZoWioTUHRuCQSZLcnSBHvwAAANg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/research&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZoWioTUHRuCQSZLcnSBHvwAAANg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>The first vulnerability in question concerns the <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2022\/05\/25\/why_apis_matter\/\" rel=\"noopener\">API<\/a> responsible for grill registration. Bishop Fox assigned it a severity score of 7.1 (high) and it has no CVE ID. The flaw is classed as an insufficient authorization control issue (CWE-284). This is what allows an attacker to potentially mess with a grillmaster&#8217;s work.<\/p>\n<p>For starters, any would-be attacker would need to know the target grill&#8217;s unique 48-bit identifier, which could feasibly be carried out by capturing network traffic while the griller tries to pair the grill with their app.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/research&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZoWioTUHRuCQSZLcnSBHvwAAANg&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/research&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZoWioTUHRuCQSZLcnSBHvwAAANg&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Realistically, you&#8217;d need eyes on the Traeger owner&#8217;s garden to know exactly when this is happening, so the attack may only be limited to irked neighbors in this regard.<\/p>\n<p>The other way of obtaining that identifier is by scanning the <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/06\/17\/asia_qr_code_obsession\/\" rel=\"noopener\">QR code<\/a> on a sticker located inside the grill&#8217;s pellet hopper. With this in mind, the number of potential attackers extends beyond a small number of neighbors to anyone who&#8217;s visited the grillmaster&#8217;s home (and been able to suspiciously skulk around the grill, smartphone in hand, all while avoiding any questions from onlookers).<\/p>\n<p>Bishop Fox went tested the exploit using an employee&#8217;s grill that wasn&#8217;t accessible to the researchers. To get the ball rolling, they retrieved a pairing token from the Traeger API after making a POST request and registered it to an <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/05\/03\/vmc_on_aws_changes\/\" rel=\"noopener\">AWS<\/a> IoT Cognito identity.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/research&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZoWioTUHRuCQSZLcnSBHvwAAANg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/research&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZoWioTUHRuCQSZLcnSBHvwAAANg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>From there, researchers were able to push commands to the device remotely from its AWS application. They were able to force the grill into engaging its shutdown sequence, which can last between 15-25 minutes and is recommended by the manufacturer to avoid grill fires and equipment damage.<\/p>\n<div class=\"CaptionedImage Center Border\" readability=\"8\"><a href=\"https:\/\/regmedia.co.uk\/2024\/07\/03\/traeger_grill_shutdown_bishop_fox.jpg\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2024\/07\/03\/traeger_grill_shutdown_bishop_fox.jpg?x=648&amp;y=388&amp;infer_y=1\" alt=\"Photo of a Traeger grill entering its shutdown cycle after researchers discovered a way to control it remotely \u2013 courtesy of Bishop Fox\" title=\"Photo of a Traeger grill entering its shutdown cycle after researchers discovered a way to control it remotely \u2013 courtesy of Bishop Fox\" height=\"388\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">Photo of a Traeger grill entering its shutdown cycle after researchers discovered a way to control it remotely \u2013 courtesy of Bishop Fox<\/p>\n<\/div>\n<p>While this wouldn&#8217;t be the most catastrophic thing to happen \u2013 the owner&#8217;s equipment would be powered off safely \u2013 it could ruin a long cook that the owner has slaved over for hours if the temperature dies for too long.<\/p>\n<div class=\"CaptionedImage Center Border\" readability=\"8\"><a href=\"https:\/\/regmedia.co.uk\/2024\/07\/03\/ruined_tofu_bbq_bishop_fox.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2024\/07\/03\/ruined_tofu_bbq_bishop_fox.png?x=648&amp;y=429&amp;infer_y=1\" alt=\"Photo of the block of tofu burnt by researchers remotely controlling a Traeger grill \u2013 courtesy of Bishop Fox\" title=\"Photo of the block of tofu burnt by researchers remotely controlling a Traeger grill \u2013 courtesy of Bishop Fox\" height=\"429\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">Photo of the block of tofu burnt by researchers remotely controlling a Traeger grill \u2013 courtesy of Bishop Fox<\/p>\n<\/div>\n<p>A more conniving trick would be to crank up the temperature and burn whatever food is inside the grill to a crisp, which is exactly what Bishop Fox did to a block of tofu, changing the temperature to 500 degrees from the recommended 165 and consequently incinerating it.<\/p>\n<p>We asked Traeger for a statement but it didn&#8217;t immediately respond.<\/p>\n<p>A second, less severe vulnerability (4.3 \u2013 medium) was also disclosed by Bishop Fox after researchers found a way to remotely force Traeger&#8217;s GraphQL API to list every grill registered with the manufacturer with a short POST request.<\/p>\n<p>The response would include various details about each grill such as its serial number, name, description, and more. It&#8217;s not quite as sexy as the first one, in truth.<\/p>\n<p>As for fixing these bugs, grillmasters needn&#8217;t worry. Traeger has already upgraded its firmware, which will be applied automatically with no intervention required from owners.<\/p>\n<p>The manufacturer also disabled the ListGrills function that underpinned the second vulnerability, so that&#8217;s all sorted now too. Just in time for that July 4 barbecue in the US, or a wet steak amid the humid drizzle on UK election day. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2024\/07\/03\/traeger_security_bugs\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Never risk it when it comes to brisket \u2013 make sure those updates are applied Keen meatheads better hope they haven&#8217;t angered any cybersecurity folk before allowing their Traeger grills to update because a new high-severity vulnerability could be used for all kinds of high jinks.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":56471,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-56470","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Traeger security bugs bad news for grillers with neighborly beef 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Traeger security bugs bad news for grillers with neighborly beef 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-03T16:24:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/regmedia.co.uk\/2021\/04\/20\/shutterstock_onion_rings.jpg?x=174&amp;amp;y=115&amp;amp;crop=1\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Traeger security bugs bad news for grillers with neighborly beef\",\"datePublished\":\"2024-07-03T16:24:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\\\/\"},\"wordCount\":788,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\\\/\",\"name\":\"Traeger security bugs bad news for grillers with neighborly beef 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef.jpg\",\"datePublished\":\"2024-07-03T16:24:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Traeger security bugs bad news for grillers with neighborly beef\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Traeger security bugs bad news for grillers with neighborly beef 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/","og_locale":"en_US","og_type":"article","og_title":"Traeger security bugs bad news for grillers with neighborly beef 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-07-03T16:24:09+00:00","og_image":[{"url":"https:\/\/regmedia.co.uk\/2021\/04\/20\/shutterstock_onion_rings.jpg?x=174&amp;amp;y=115&amp;amp;crop=1","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Traeger security bugs bad news for grillers with neighborly beef","datePublished":"2024-07-03T16:24:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/"},"wordCount":788,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/","url":"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/","name":"Traeger security bugs bad news for grillers with neighborly beef 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef.jpg","datePublished":"2024-07-03T16:24:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/traeger-security-bugs-bad-news-for-grillers-with-neighborly-beef\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Traeger security bugs bad news for grillers with neighborly beef"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=56470"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56470\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/56471"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=56470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=56470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=56470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}