Vulnerabilites related to silabs.com - Z/IP Gateway SDK
CVE-2024-3051 (GCVE-0-2024-3051)
Vulnerability from cvelistv5
Published
2024-04-26 21:26
Modified
2024-09-27 16:09
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Malformed Device Reset Locally command classes can be sent to temporarily deny service to an end device. Any frames sent by the end device will not be acknowledged by the gateway during this time.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
silabs.com | Z/IP Gateway SDK |
Version: 0 ≤ 7.18.03 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:silabs:z\\/ip_gateway_sdk:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "z\\/ip_gateway_sdk", "vendor": "silabs", "versions": [ { "status": "affected", "version": "-" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-3051", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-29T16:34:09.684748Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:31:05.004Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T19:32:42.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "permissions-required", "x_transferred" ], "url": "https://community.silabs.com/068Vm0000045w2j" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": "Gecko SDK", "product": "Z/IP Gateway SDK", "repo": "https://github.com/SiliconLabs/gecko_sdk/releases", "vendor": "silabs.com", "versions": [ { "lessThanOrEqual": "7.18.03", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Malformed Device Reset Locally command classes can be sent to temporarily deny service to an end device. Any frames sent by the end device will not be acknowledged by the gateway during this time.\u0026nbsp;" } ], "value": "Malformed Device Reset Locally command classes can be sent to temporarily deny service to an end device. Any frames sent by the end device will not be acknowledged by the gateway during this time." } ], "impacts": [ { "capecId": "CAPEC-601", "descriptions": [ { "lang": "en", "value": "CAPEC-601 Jamming" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-419", "description": "CWE-419 Unprotected Primary Channel", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T16:09:38.663Z", "orgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "shortName": "Silabs" }, "references": [ { "tags": [ "permissions-required" ], "url": "https://community.silabs.com/068Vm0000045w2j" } ], "source": { "discovery": "UNKNOWN" }, "title": "Z/IP Gateway Device Reset Locally Denial of Service Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "assignerShortName": "Silabs", "cveId": "CVE-2024-3051", "datePublished": "2024-04-26T21:26:38.377Z", "dateReserved": "2024-03-28T19:04:58.593Z", "dateUpdated": "2024-09-27T16:09:38.663Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-3052 (GCVE-0-2024-3052)
Vulnerability from cvelistv5
Published
2024-04-26 21:27
Modified
2025-02-05 21:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-248 - Uncaught Exception
Summary
Malformed S2 Nonce Get command classes can be sent to crash the gateway. A hard reset is required to recover the gateway.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
silabs.com | Z/IP Gateway SDK |
Version: 0 ≤ |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:silabs:z\\/ip_gateway_sdk:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "z\\/ip_gateway_sdk", "vendor": "silabs", "versions": [ { "lessThan": "7.14.00", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-3052", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T21:24:21.239587Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-05T21:25:23.134Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T19:32:42.571Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "permissions-required", "x_transferred" ], "url": "https://community.silabs.com/068Vm0000045w2j" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "Z/IP Gateway SDK", "product": "Z/IP Gateway SDK", "repo": "https://github.com/SiliconLabs/gecko_sdk/releases", "vendor": "silabs.com", "versions": [ { "lessThan": "7.14.00", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMalformed S2 Nonce Get command classes can be sent to crash the gateway. A hard reset is required to recover the gateway.\u003c/span\u003e" } ], "value": "Malformed S2 Nonce Get command classes can be sent to crash the gateway. A hard reset is required to recover the gateway." } ], "impacts": [ { "capecId": "CAPEC-601", "descriptions": [ { "lang": "en", "value": "CAPEC-601 Jamming" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T16:13:04.990Z", "orgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "shortName": "Silabs" }, "references": [ { "tags": [ "permissions-required" ], "url": "https://community.silabs.com/068Vm0000045w2j" } ], "source": { "discovery": "UNKNOWN" }, "title": "Z/IP Gateway S2 Nonce Get Denial of Service Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "assignerShortName": "Silabs", "cveId": "CVE-2024-3052", "datePublished": "2024-04-26T21:27:16.422Z", "dateReserved": "2024-03-28T19:05:04.219Z", "dateUpdated": "2025-02-05T21:25:23.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-4489 (GCVE-0-2023-4489)
Vulnerability from cvelistv5
Published
2023-12-14 23:00
Modified
2025-05-21 14:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1279 - Cryptographic Operations are run Before Supporting Units are Ready
Summary
The first S0 encryption key is generated with an uninitialized PRNG in Z/IP Gateway products running Silicon Labs Z/IP Gateway SDK v7.18.3 and earlier. This makes the first S0 key generated at startup predictable, potentially allowing network key prediction and unauthorized S0 network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
silabs.com | Z/IP Gateway SDK |
Version: 0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:31:05.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000buWj0QAE?operationContext=S1" }, { "tags": [ "x_transferred" ], "url": "https://github.com/SiliconLabs/gecko_sdk" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4489", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-21T14:28:57.358361Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-21T14:29:37.355Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Z/IP Gateway SDK", "vendor": "silabs.com", "versions": [ { "lessThanOrEqual": "7.18.3", "status": "affected", "version": "0", "versionType": "LessThan" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe first S0 encryption key is generated with an uninitialized PRNG in Z/IP Gateway products running Silicon Labs Z/IP Gateway SDK v7.18.3 and earlier. \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThis makes the first S0 key generated at startup predictable, potentially allowing network key prediction and unauthorized S0 network access.\u003c/span\u003e\n\n\u003ctable\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003e \u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e" } ], "value": "The first S0 encryption key is generated with an uninitialized PRNG in Z/IP Gateway products running Silicon Labs Z/IP Gateway SDK v7.18.3 and earlier. This makes the first S0 key generated at startup predictable, potentially allowing network key prediction and unauthorized S0 network access." } ], "impacts": [ { "capecId": "CAPEC-59", "descriptions": [ { "lang": "en", "value": "CAPEC-59 Session Credential Falsification through Prediction" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1279", "description": "CWE-1279 Cryptographic Operations are run Before Supporting Units are Ready", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T16:22:41.599Z", "orgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "shortName": "Silabs" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000buWj0QAE?operationContext=S1" }, { "url": "https://github.com/SiliconLabs/gecko_sdk" } ], "source": { "discovery": "UNKNOWN" }, "title": "Z/IP Gateway Use of Uninitialized PRNG when Generating S0 Encryption Key", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "assignerShortName": "Silabs", "cveId": "CVE-2023-4489", "datePublished": "2023-12-14T23:00:29.693Z", "dateReserved": "2023-08-23T04:17:01.960Z", "dateUpdated": "2025-05-21T14:29:37.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }