Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2018-25029
PUBLISHED
More InfoOfficial Page
Assigner-certcc
Assigner Org ID-37e5125f-f79b-445b-8fad-9564f167944b
View Known Exploited Vulnerability (KEV) details
Published At-04 Feb, 2022 | 22:33
Updated At-17 Sep, 2024 | 03:32
Rejected At-
▼CVE Numbering Authority (CNA)

The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic.

Affected Products
Vendor
Silicon Labs
Product
Z-Wave
Versions
Affected
  • S2
Problem Types
TypeCWE IDDescription
CWECWE-757CWE-757: Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/
x_refsource_MISC
https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/
x_refsource_MISC
x_transferred
https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure
x_refsource_CONFIRM
x_transferred
Details not found