Executive Summary
Summary | |
---|---|
Title | Silicon Labs Z-Wave chipsets contain multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | VU#142629 | First vendor Publication | 2022-01-07 |
Vendor | VU-CERT | Last vendor Modification | 2022-01-09 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 8.8 | ||
Base Score | 8.8 | Environmental Score | 8.8 |
impact SubScore | 5.9 | Temporal Score | 8.8 |
Exploitabality Sub Score | 2.8 | ||
Attack Vector | Adjacent | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:A/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 8.3 | Attack Range | Adjacent network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 6.5 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
OverviewVarious Silicon Labs Z-Wave chipsets do not support encryption, can be downgraded to not use weaker encryption, and are vulnerable to denial of service. Some of these vulnerabilities are inherent in Z-Wave protocol specifications. DescriptionZ-Wave devices based on Silicon Labs chipsets have multiple vulnerabilities. For further details, including specific devices tested, see Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes. CVE-2020-9057 CVE-2020-9058 CVE-2020-9059 CVE-2020-9060 CVE-2020-9061 CVE-2020-10137 ImpactDepending on the chipset and device, an attacker within Z-Wave radio range can deny service, cause devices to crash, deplete batteries, intercept, observe, and replay traffic, and control vulnerable devices. SolutionMitigations for these vulnerabilities vary based on the chipset and device. In some cases it may be necessary to upgrade to newer hardware, for example, 500 and 700 series chipsets that support S2 authentication and encryption. AcknowledgementsThanks to Carlos Kayembe Nkuba, Seulbae Kim, Sven Dietrich, and Heejo Lee for researching and reporting these vulnerabilities. This document was written by Timur Snoke and Art Manion. |
Original Source
Url : https://kb.cert.org/vuls/id/142629 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
40 % | CWE-311 | Missing Encryption of Sensitive Data (CWE/SANS Top 25) |
20 % | CWE-770 | Allocation of Resources Without Limits or Throttling |
20 % | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
20 % | CWE-345 | Insufficient Verification of Data Authenticity |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 2 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 |
Alert History
Date | Informations |
---|---|
2022-01-18 21:29:22 |
|
2022-01-09 05:17:42 |
|
2022-01-08 00:17:43 |
|