Vulnerabilites related to silabs - zgm130s037hgn
CVE-2024-50929 (GCVE-0-2024-50929)
Vulnerability from cvelistv5
Published
2024-12-10 00:00
Modified
2024-12-11 15:41
CWE
  • n/a
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to arbitrarily change the device type in the controller's memory, leading to a Denial of Service (DoS).
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.2,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-50929",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-11T15:39:18.630707Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-281",
                "description": "CWE-281 Improper Preservation of Permissions",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-11T15:41:41.300Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to arbitrarily change the device type in the controller\u0027s memory, leading to a Denial of Service (DoS)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-10T19:05:07.665280",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-50929",
    "datePublished": "2024-12-10T00:00:00",
    "dateReserved": "2024-10-28T00:00:00",
    "dateUpdated": "2024-12-11T15:41:41.300Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-50924 (GCVE-0-2024-50924)
Vulnerability from cvelistv5
Published
2024-12-10 00:00
Modified
2024-12-11 21:13
CWE
  • n/a
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause disrupt communications between the controller and the device itself via repeatedly sending crafted packets to the controller.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-50924",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-11T21:12:36.682819Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-281",
                "description": "CWE-281 Improper Preservation of Permissions",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-11T21:13:11.234Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause disrupt communications between the controller and the device itself via repeatedly sending crafted packets to the controller."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-10T19:02:03.475651",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-50924",
    "datePublished": "2024-12-10T00:00:00",
    "dateReserved": "2024-10-28T00:00:00",
    "dateUpdated": "2024-12-11T21:13:11.234Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-50920 (GCVE-0-2024-50920)
Vulnerability from cvelistv5
Published
2024-12-10 00:00
Modified
2024-12-11 15:44
CWE
  • n/a
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to create a fake node via supplying crafted packets.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-50920",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-11T15:42:44.367613Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-281",
                "description": "CWE-281 Improper Preservation of Permissions",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-11T15:44:04.751Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to create a fake node via supplying crafted packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-10T18:58:29.139042",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-50920",
    "datePublished": "2024-12-10T00:00:00",
    "dateReserved": "2024-10-28T00:00:00",
    "dateUpdated": "2024-12-11T15:44:04.751Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-25029 (GCVE-0-2018-25029)
Vulnerability from cvelistv5
Published
2022-02-04 22:33
Modified
2024-09-17 03:32
Severity ?
CWE
  • CWE-757 - Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
Summary
The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T12:26:39.603Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Z-Wave",
          "vendor": "Silicon Labs",
          "versions": [
            {
              "status": "affected",
              "version": "S2"
            }
          ]
        }
      ],
      "datePublic": "2018-05-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-757",
              "description": "CWE-757: Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-04T22:33:06",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "DATE_PUBLIC": "2018-05-23T00:00:00.000Z",
          "ID": "CVE-2018-25029",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Z-Wave",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_name": "S2",
                            "version_value": "S2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Silicon Labs"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-757: Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/",
              "refsource": "MISC",
              "url": "https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/"
            },
            {
              "name": "https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure",
              "refsource": "CONFIRM",
              "url": "https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2018-25029",
    "datePublished": "2022-02-04T22:33:06.210079Z",
    "dateReserved": "2022-01-26T00:00:00",
    "dateUpdated": "2024-09-17T03:32:57.132Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-50928 (GCVE-0-2024-50928)
Vulnerability from cvelistv5
Published
2024-12-10 00:00
Modified
2024-12-11 21:14
CWE
  • n/a
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to change the wakeup interval of end devices in controller memory, disrupting the device's communications with the controller.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-50928",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-11T21:13:37.133914Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-281",
                "description": "CWE-281 Improper Preservation of Permissions",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-11T21:14:18.191Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to change the wakeup interval of end devices in controller memory, disrupting the device\u0027s communications with the controller."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-10T19:03:39.020148",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-50928",
    "datePublished": "2024-12-10T00:00:00",
    "dateReserved": "2024-10-28T00:00:00",
    "dateUpdated": "2024-12-11T21:14:18.191Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-20003 (GCVE-0-2013-20003)
Vulnerability from cvelistv5
Published
2022-02-04 22:33
Modified
2024-09-16 22:10
Severity ?
CWE
  • CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Summary
Z-Wave devices from Sierra Designs (circa 2013) and Silicon Labs (using S0 security) may use a known, shared network key of all zeros, allowing an attacker within radio range to spoof Z-Wave traffic.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:09:17.060Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://sensepost.com/cms/resources/conferences/2013/bh_zwave/Security%20Evaluation%20of%20Z-Wave_WP.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://orangecyberdefense.com/global/blog/sensepost/blackhat-conference-z-wave-security/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Z-Wave",
          "vendor": "Silicon Labs",
          "versions": [
            {
              "status": "affected",
              "version": "S0"
            }
          ]
        },
        {
          "product": "Z-Wave",
          "vendor": "Sierra Designs",
          "versions": [
            {
              "lessThan": "S0",
              "status": "affected",
              "version": "S0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2013-08-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Z-Wave devices from Sierra Designs (circa 2013) and Silicon Labs (using S0 security) may use a known, shared network key of all zeros, allowing an attacker within radio range to spoof Z-Wave traffic."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-327",
              "description": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-04T22:33:05",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://sensepost.com/cms/resources/conferences/2013/bh_zwave/Security%20Evaluation%20of%20Z-Wave_WP.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://orangecyberdefense.com/global/blog/sensepost/blackhat-conference-z-wave-security/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "DATE_PUBLIC": "2013-08-01T17:15:00.000Z",
          "ID": "CVE-2013-20003",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Z-Wave",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_name": "S0",
                            "version_value": "S0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Silicon Labs"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Z-Wave",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "S0",
                            "version_value": "S0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Sierra Designs"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Z-Wave devices from Sierra Designs (circa 2013) and Silicon Labs (using S0 security) may use a known, shared network key of all zeros, allowing an attacker within radio range to spoof Z-Wave traffic."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://sensepost.com/cms/resources/conferences/2013/bh_zwave/Security%20Evaluation%20of%20Z-Wave_WP.pdf",
              "refsource": "MISC",
              "url": "https://sensepost.com/cms/resources/conferences/2013/bh_zwave/Security%20Evaluation%20of%20Z-Wave_WP.pdf"
            },
            {
              "name": "https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/",
              "refsource": "MISC",
              "url": "https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/"
            },
            {
              "name": "https://orangecyberdefense.com/global/blog/sensepost/blackhat-conference-z-wave-security/",
              "refsource": "MISC",
              "url": "https://orangecyberdefense.com/global/blog/sensepost/blackhat-conference-z-wave-security/"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2013-20003",
    "datePublished": "2022-02-04T22:33:05.137670Z",
    "dateReserved": "2022-01-26T00:00:00",
    "dateUpdated": "2024-09-16T22:10:27.914Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-50921 (GCVE-0-2024-50921)
Vulnerability from cvelistv5
Published
2024-12-10 00:00
Modified
2024-12-11 21:03
CWE
  • n/a
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause a Denial of Service (DoS) via repeatedly sending crafted packets to the controller.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-50921",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-11T20:59:36.294471Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-281",
                "description": "CWE-281 Improper Preservation of Permissions",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-11T21:03:54.481Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause a Denial of Service (DoS) via repeatedly sending crafted packets to the controller."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-10T19:00:17.072441",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-50921",
    "datePublished": "2024-12-10T00:00:00",
    "dateReserved": "2024-10-28T00:00:00",
    "dateUpdated": "2024-12-11T21:03:54.481Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2022-02-04 23:15
Modified
2024-11-21 04:03
Summary
The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silabs:zgm130s037hgn_firmware:s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAE411D1-DEAB-4251-A7A4-B55492D53AC2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57708CEA-8CF3-4FAF-A7D4-8572EE7A7E53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silabs:zm5202_firmware:s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0F01E96-49C5-4FB6-A549-5B25F04B26DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:silabs:zm5202:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64DAB9DC-A25C-4C7B-8A98-D6AAD3DF46CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silabs:zm5101_firmware:s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D529D8C9-6882-4631-AE7A-E7EE52CA4E73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:silabs:zm5101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D7DA65-1F1E-4C1C-A9EB-16F615E5C34A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silabs:zgm2305a27hgn_firmware:s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC94143-DE93-4179-B4E3-9B684E28A6F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:silabs:zgm2305a27hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A86A154-AD74-4EFB-B94A-15C619683EB4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silabs:zgm230sb27hgn_firmware:s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE07BCD8-452E-43B4-BC8B-30797A3CF830",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5794CE0B-4A2F-439F-A6DF-42A710E35D89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic."
    },
    {
      "lang": "es",
      "value": "La especificaci\u00f3n Z-Wave requiere que la seguridad S2 pueda ser degradada a S0 u otros protocolos menos seguros, permitiendo a un atacante dentro del rango de radio durante el emparejamiento degradar y luego explotar una vulnerabilidad diferente (CVE-2013-20003) para interceptar y falsificar el tr\u00e1fico"
    }
  ],
  "id": "CVE-2018-25029",
  "lastModified": "2024-11-21T04:03:23.580",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-04T23:15:09.730",
  "references": [
    {
      "source": "cret@cert.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-757"
        }
      ],
      "source": "cret@cert.org",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-10 19:15
Modified
2025-07-01 15:28
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to create a fake node via supplying crafted packets.
References



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silabs:z-wave_software_development_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3939A08E-08C2-46E4-A78E-0D8DC840F414",
              "versionEndIncluding": "7.21.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg14p231f256gm32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2DFB610-ABC0-4BF9-AB1B-EBE6919306A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A25C5C4-EC69-4A14-9DBC-43CF3575D42A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE85974A-943D-4F65-83C7-2F348EFB8D73",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E572162D-C2AF-4859-BA1F-44312C441964",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BC1B3E-F501-48D4-8677-9DA3E0FAA1DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C6FF1AE-BD40-42F4-BFA6-3EAB981B53A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80565B28-70B9-4085-AA23-9FFAA32847A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b011f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF915B76-59C2-48E3-A718-95D8EBF30DC4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BF75E38-325F-4E8F-AA55-5D68C1C81B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13584AB6-3E8C-417C-A713-AD2BC826C1DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b021f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D96B8612-8818-40B4-BB02-3E29C5A8EBFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57708CEA-8CF3-4FAF-A7D4-8572EE7A7E53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:zgm230sa27hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93C8AAF3-390E-4755-BEB3-789AECE5A04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5794CE0B-4A2F-439F-A6DF-42A710E35D89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to create a fake node via supplying crafted packets."
    },
    {
      "lang": "es",
      "value": "Los permisos inseguros en Silicon Labs (SiLabs) Z-Wave Series 700 y 800 v7.21.1 permiten a los atacantes crear un nodo falso mediante el suministro de paquetes manipulados."
    }
  ],
  "id": "CVE-2024-50920",
  "lastModified": "2025-07-01T15:28:22.123",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-10T19:15:30.290",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-281"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-10 19:15
Modified
2025-07-01 15:28
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause a Denial of Service (DoS) via repeatedly sending crafted packets to the controller.
References



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silabs:z-wave_software_development_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3939A08E-08C2-46E4-A78E-0D8DC840F414",
              "versionEndIncluding": "7.21.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg14p231f256gm32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2DFB610-ABC0-4BF9-AB1B-EBE6919306A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A25C5C4-EC69-4A14-9DBC-43CF3575D42A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE85974A-943D-4F65-83C7-2F348EFB8D73",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E572162D-C2AF-4859-BA1F-44312C441964",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BC1B3E-F501-48D4-8677-9DA3E0FAA1DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C6FF1AE-BD40-42F4-BFA6-3EAB981B53A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80565B28-70B9-4085-AA23-9FFAA32847A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b011f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF915B76-59C2-48E3-A718-95D8EBF30DC4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BF75E38-325F-4E8F-AA55-5D68C1C81B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13584AB6-3E8C-417C-A713-AD2BC826C1DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b021f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D96B8612-8818-40B4-BB02-3E29C5A8EBFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57708CEA-8CF3-4FAF-A7D4-8572EE7A7E53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:zgm230sa27hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93C8AAF3-390E-4755-BEB3-789AECE5A04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5794CE0B-4A2F-439F-A6DF-42A710E35D89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause a Denial of Service (DoS) via repeatedly sending crafted packets to the controller."
    },
    {
      "lang": "es",
      "value": "Los permisos inseguros en Silicon Labs (SiLabs) Z-Wave Series 700 y 800 v7.21.1 permiten a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante el env\u00edo repetido de paquetes manipulados al controlador."
    }
  ],
  "id": "CVE-2024-50921",
  "lastModified": "2025-07-01T15:28:43.840",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-10T19:15:30.380",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-281"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-10 19:15
Modified
2025-07-01 15:28
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause disrupt communications between the controller and the device itself via repeatedly sending crafted packets to the controller.
References



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silabs:z-wave_software_development_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3939A08E-08C2-46E4-A78E-0D8DC840F414",
              "versionEndIncluding": "7.21.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg14p231f256gm32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2DFB610-ABC0-4BF9-AB1B-EBE6919306A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A25C5C4-EC69-4A14-9DBC-43CF3575D42A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE85974A-943D-4F65-83C7-2F348EFB8D73",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E572162D-C2AF-4859-BA1F-44312C441964",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BC1B3E-F501-48D4-8677-9DA3E0FAA1DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C6FF1AE-BD40-42F4-BFA6-3EAB981B53A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80565B28-70B9-4085-AA23-9FFAA32847A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b011f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF915B76-59C2-48E3-A718-95D8EBF30DC4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BF75E38-325F-4E8F-AA55-5D68C1C81B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13584AB6-3E8C-417C-A713-AD2BC826C1DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b021f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D96B8612-8818-40B4-BB02-3E29C5A8EBFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57708CEA-8CF3-4FAF-A7D4-8572EE7A7E53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:zgm230sa27hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93C8AAF3-390E-4755-BEB3-789AECE5A04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5794CE0B-4A2F-439F-A6DF-42A710E35D89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause disrupt communications between the controller and the device itself via repeatedly sending crafted packets to the controller."
    },
    {
      "lang": "es",
      "value": "Los permisos inseguros en Silicon Labs (SiLabs) Z-Wave Series 700 y 800 v7.21.1 permiten a los atacantes interrumpir las comunicaciones entre el controlador y el dispositivo en s\u00ed mediante el env\u00edo repetido de paquetes manipulados al controlador."
    }
  ],
  "id": "CVE-2024-50924",
  "lastModified": "2025-07-01T15:28:52.527",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-10T19:15:30.463",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-281"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-10 19:15
Modified
2025-07-01 15:32
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to change the wakeup interval of end devices in controller memory, disrupting the device's communications with the controller.
References



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:silabs:z-wave_software_development_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEF36372-E7C1-49F6-97C5-412CCD9771C3",
              "versionEndIncluding": "7.21.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg14p231f256gm32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2DFB610-ABC0-4BF9-AB1B-EBE6919306A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A25C5C4-EC69-4A14-9DBC-43CF3575D42A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE85974A-943D-4F65-83C7-2F348EFB8D73",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E572162D-C2AF-4859-BA1F-44312C441964",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BC1B3E-F501-48D4-8677-9DA3E0FAA1DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C6FF1AE-BD40-42F4-BFA6-3EAB981B53A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80565B28-70B9-4085-AA23-9FFAA32847A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b011f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF915B76-59C2-48E3-A718-95D8EBF30DC4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BF75E38-325F-4E8F-AA55-5D68C1C81B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13584AB6-3E8C-417C-A713-AD2BC826C1DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b021f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D96B8612-8818-40B4-BB02-3E29C5A8EBFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57708CEA-8CF3-4FAF-A7D4-8572EE7A7E53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:zgm230sa27hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93C8AAF3-390E-4755-BEB3-789AECE5A04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5794CE0B-4A2F-439F-A6DF-42A710E35D89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to change the wakeup interval of end devices in controller memory, disrupting the device\u0027s communications with the controller."
    },
    {
      "lang": "es",
      "value": "Los permisos inseguros en Silicon Labs (SiLabs) Z-Wave Series 700 y 800 v7.21.1 permiten a los atacantes cambiar el intervalo de activaci\u00f3n de los dispositivos finales en la memoria del controlador, interrumpiendo las comunicaciones del dispositivo con el controlador."
    }
  ],
  "id": "CVE-2024-50928",
  "lastModified": "2025-07-01T15:32:13.433",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-10T19:15:30.550",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-281"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-10 19:15
Modified
2025-07-01 15:32
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to arbitrarily change the device type in the controller's memory, leading to a Denial of Service (DoS).
References



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:silabs:z-wave_software_development_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEF36372-E7C1-49F6-97C5-412CCD9771C3",
              "versionEndIncluding": "7.21.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg14p231f256gm32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2DFB610-ABC0-4BF9-AB1B-EBE6919306A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A25C5C4-EC69-4A14-9DBC-43CF3575D42A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE85974A-943D-4F65-83C7-2F348EFB8D73",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E572162D-C2AF-4859-BA1F-44312C441964",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BC1B3E-F501-48D4-8677-9DA3E0FAA1DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C6FF1AE-BD40-42F4-BFA6-3EAB981B53A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80565B28-70B9-4085-AA23-9FFAA32847A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b011f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF915B76-59C2-48E3-A718-95D8EBF30DC4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BF75E38-325F-4E8F-AA55-5D68C1C81B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13584AB6-3E8C-417C-A713-AD2BC826C1DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:efr32zg23b021f512im40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D96B8612-8818-40B4-BB02-3E29C5A8EBFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57708CEA-8CF3-4FAF-A7D4-8572EE7A7E53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:zgm230sa27hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93C8AAF3-390E-4755-BEB3-789AECE5A04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5794CE0B-4A2F-439F-A6DF-42A710E35D89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to arbitrarily change the device type in the controller\u0027s memory, leading to a Denial of Service (DoS)."
    },
    {
      "lang": "es",
      "value": "Los permisos inseguros en Silicon Labs (SiLabs) Z-Wave Series 700 y 800 v7.21.1 permiten a los atacantes cambiar arbitrariamente el tipo de dispositivo en la memoria del controlador, lo que lleva a una denegaci\u00f3n de servicio (DoS)."
    }
  ],
  "id": "CVE-2024-50929",
  "lastModified": "2025-07-01T15:32:36.967",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.2,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-10T19:15:30.643",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-281"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-04 23:15
Modified
2024-11-21 01:50
Summary
Z-Wave devices from Sierra Designs (circa 2013) and Silicon Labs (using S0 security) may use a known, shared network key of all zeros, allowing an attacker within radio range to spoof Z-Wave traffic.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silabs:zgm130s037hgn_firmware:s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAE411D1-DEAB-4251-A7A4-B55492D53AC2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57708CEA-8CF3-4FAF-A7D4-8572EE7A7E53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silabs:zm5202_firmware:s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0F01E96-49C5-4FB6-A549-5B25F04B26DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:silabs:zm5202:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64DAB9DC-A25C-4C7B-8A98-D6AAD3DF46CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silabs:zm5101_firmware:s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D529D8C9-6882-4631-AE7A-E7EE52CA4E73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:silabs:zm5101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D7DA65-1F1E-4C1C-A9EB-16F615E5C34A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silabs:zgm2305a27hgn_firmware:s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC94143-DE93-4179-B4E3-9B684E28A6F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:silabs:zgm2305a27hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A86A154-AD74-4EFB-B94A-15C619683EB4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:silabs:zgm230sb27hgn_firmware:s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE07BCD8-452E-43B4-BC8B-30797A3CF830",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5794CE0B-4A2F-439F-A6DF-42A710E35D89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Z-Wave devices from Sierra Designs (circa 2013) and Silicon Labs (using S0 security) may use a known, shared network key of all zeros, allowing an attacker within radio range to spoof Z-Wave traffic."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Z-Wave de Sierra Designs (alrededor de 2013) y Silicon Labs (que usan seguridad S0) pueden usar una clave de red conocida y compartida de todos los ceros, lo que permite a un atacante dentro del rango de radio falsificar el tr\u00e1fico Z-Wave"
    }
  ],
  "id": "CVE-2013-20003",
  "lastModified": "2024-11-21T01:50:49.910",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 5.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-04T23:15:09.627",
  "references": [
    {
      "source": "cret@cert.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://orangecyberdefense.com/global/blog/sensepost/blackhat-conference-z-wave-security/"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://sensepost.com/cms/resources/conferences/2013/bh_zwave/Security%20Evaluation%20of%20Z-Wave_WP.pdf"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://orangecyberdefense.com/global/blog/sensepost/blackhat-conference-z-wave-security/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://sensepost.com/cms/resources/conferences/2013/bh_zwave/Security%20Evaluation%20of%20Z-Wave_WP.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-327"
        }
      ],
      "source": "cret@cert.org",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-338"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}