Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2018-25029
Analyzed
More InfoOfficial Page
Source-cret@cert.org
View Known Exploited Vulnerability (KEV) details
Published At-04 Feb, 2022 | 23:15
Updated At-09 Feb, 2022 | 15:45

The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.1HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Primary2.04.8MEDIUM
AV:A/AC:L/Au:N/C:P/I:P/A:N
CPE Matches

silabs
silabs
>>zgm130s037hgn>>-
cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*
silabs
silabs
>>zgm130s037hgn_firmware>>s2
cpe:2.3:o:silabs:zgm130s037hgn_firmware:s2:*:*:*:*:*:*:*
silabs
silabs
>>zm5202>>-
cpe:2.3:h:silabs:zm5202:-:*:*:*:*:*:*:*
silabs
silabs
>>zm5202_firmware>>s2
cpe:2.3:o:silabs:zm5202_firmware:s2:*:*:*:*:*:*:*
silabs
silabs
>>zm5101>>-
cpe:2.3:h:silabs:zm5101:-:*:*:*:*:*:*:*
silabs
silabs
>>zm5101_firmware>>s2
cpe:2.3:o:silabs:zm5101_firmware:s2:*:*:*:*:*:*:*
silabs
silabs
>>zgm2305a27hgn>>-
cpe:2.3:h:silabs:zgm2305a27hgn:-:*:*:*:*:*:*:*
silabs
silabs
>>zgm2305a27hgn_firmware>>s2
cpe:2.3:o:silabs:zgm2305a27hgn_firmware:s2:*:*:*:*:*:*:*
silabs
silabs
>>zgm230sb27hgn>>-
cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*
silabs
silabs
>>zgm230sb27hgn_firmware>>s2
cpe:2.3:o:silabs:zgm230sb27hgn_firmware:s2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE-757Secondarycret@cert.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-securecret@cert.org
Third Party Advisory
https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/cret@cert.org
Exploit
Third Party Advisory
Change History
0Changes found

Details not found