fkie_cve-2024-50924
Vulnerability from fkie_nvd
Published
2024-12-10 19:15
Modified
2025-07-01 15:28
Severity ?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause disrupt communications between the controller and the device itself via repeatedly sending crafted packets to the controller.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/CNK2100/2024-CVE/blob/main/README.md | Exploit, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:silabs:z-wave_software_development_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "3939A08E-08C2-46E4-A78E-0D8DC840F414", "versionEndIncluding": "7.21.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:silabs:efr32zg14p231f256gm32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2DFB610-ABC0-4BF9-AB1B-EBE6919306A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm40:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A25C5C4-EC69-4A14-9DBC-43CF3575D42A", "vulnerable": false }, { "criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm48:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE85974A-943D-4F65-83C7-2F348EFB8D73", "vulnerable": false }, { "criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm40:-:*:*:*:*:*:*:*", "matchCriteriaId": "E572162D-C2AF-4859-BA1F-44312C441964", "vulnerable": false }, { "criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm48:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BC1B3E-F501-48D4-8677-9DA3E0FAA1DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im40:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C6FF1AE-BD40-42F4-BFA6-3EAB981B53A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im48:-:*:*:*:*:*:*:*", "matchCriteriaId": "80565B28-70B9-4085-AA23-9FFAA32847A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:silabs:efr32zg23b011f512im40:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF915B76-59C2-48E3-A718-95D8EBF30DC4", "vulnerable": false }, { "criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im40:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BF75E38-325F-4E8F-AA55-5D68C1C81B6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im48:-:*:*:*:*:*:*:*", "matchCriteriaId": "13584AB6-3E8C-417C-A713-AD2BC826C1DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:silabs:efr32zg23b021f512im40:-:*:*:*:*:*:*:*", "matchCriteriaId": "D96B8612-8818-40B4-BB02-3E29C5A8EBFF", "vulnerable": false }, { "criteria": "cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*", "matchCriteriaId": "57708CEA-8CF3-4FAF-A7D4-8572EE7A7E53", "vulnerable": false }, { "criteria": "cpe:2.3:h:silabs:zgm230sa27hgn:-:*:*:*:*:*:*:*", "matchCriteriaId": "93C8AAF3-390E-4755-BEB3-789AECE5A04E", "vulnerable": false }, { "criteria": "cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*", "matchCriteriaId": "5794CE0B-4A2F-439F-A6DF-42A710E35D89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause disrupt communications between the controller and the device itself via repeatedly sending crafted packets to the controller." }, { "lang": "es", "value": "Los permisos inseguros en Silicon Labs (SiLabs) Z-Wave Series 700 y 800 v7.21.1 permiten a los atacantes interrumpir las comunicaciones entre el controlador y el dispositivo en s\u00ed mediante el env\u00edo repetido de paquetes manipulados al controlador." } ], "id": "CVE-2024-50924", "lastModified": "2025-07-01T15:28:52.527", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-12-10T19:15:30.463", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…