Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

silabs

Source -

ADPNVD

BOS Name -

N/A

CNA CVEs -

0

ADP CVEs -

15

CISA CVEs -

0

NVD CVEs -

84
Related CVEsRelated ProductsRelated AssignersReports
90Vulnerabilities found

CVE-2023-3110
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-9.6||CRITICAL
EPSS-0.05% / 13.71%
||
7 Day CHG~0.00%
Published-21 Jun, 2023 | 19:44
Updated-09 Dec, 2024 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer overflow in S0 Decryption on Unify Gateway

Description: A vulnerability in SiLabs Unify Gateway 1.3.1 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.

Action-Not Available
Vendor-silabsSilicon Labs
Product-unify_software_development_kitUnify Gateway
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-0972
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-9.6||CRITICAL
EPSS-0.04% / 10.80%
||
7 Day CHG~0.00%
Published-21 Jun, 2023 | 19:43
Updated-06 Dec, 2024 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer overflow in S0 Decryption on Z/IP Gatweay

Description: A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.

Action-Not Available
Vendor-silabsSilicon Labs
Product-z\/ip_gateway_sdkZ/IP Gateway
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-0971
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-9.6||CRITICAL
EPSS-0.01% / 0.62%
||
7 Day CHG~0.00%
Published-21 Jun, 2023 | 19:42
Updated-06 Dec, 2024 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command Authentication Bypass in Z/IP Gateway

A logic error in SiLabs Z/IP Gateway SDK 7.18.02 and earlier allows authentication to be bypassed, remote administration of Z-Wave controllers, and S0/S2 encryption keys to be recovered.

Action-Not Available
Vendor-silabsSilicon Labs
Product-z\/ip_gateway_sdkZ/IP Gateway
CWE ID-CWE-268
Privilege Chaining
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-0970
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-7.1||HIGH
EPSS-0.03% / 6.87%
||
7 Day CHG~0.00%
Published-21 Jun, 2023 | 19:41
Updated-06 Dec, 2024 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Serial API Buffer Overflow in Z/IP Gateway

Multiple buffer overflow vulnerabilities in SiLabs Z/IP Gateway SDK version 7.18.01 and earlier allow an attacker with invasive physical access to a Z-Wave controller device to overwrite global memory and potentially execute arbitrary code.

Action-Not Available
Vendor-silabsSilicon Labs
Product-z\/ip_gateway_sdkZ/IP Gateway
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-0969
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-3.5||LOW
EPSS-0.03% / 6.77%
||
7 Day CHG~0.00%
Published-21 Jun, 2023 | 19:40
Updated-06 Dec, 2024 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Global read overflow in Z/IP Gateway

A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an authenticated attacker within Z-Wave range to manipulate an array pointer to disclose the contents of global memory.

Action-Not Available
Vendor-silabsSilicon Labs
Product-z\/ip_gateway_sdkZ/IP Gateway
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-2747
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-3.1||LOW
EPSS-0.03% / 6.95%
||
7 Day CHG~0.00%
Published-15 Jun, 2023 | 19:49
Updated-11 Dec, 2024 | 20:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Uninitialized IV in Silicon Labs SE FW v2.0.0 through v 2.2.1 for internally stored data

The initialization vector (IV) used by the secure engine (SE) for encrypting data stored in the SE flash memory is uninitialized.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGSDK
CWE ID-CWE-1204
Generation of Weak Initialization Vector (IV)
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2023-2683
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 7.51%
||
7 Day CHG~0.00%
Published-15 Jun, 2023 | 19:05
Updated-11 Dec, 2024 | 21:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Connection update while closing connection may lead to denial-of-service

A memory leak in the EFR32 Bluetooth LE stack 5.1.0 through 5.1.1 allows an attacker to send an invalid pairing message and cause future legitimate connection attempts to fail. A reset of the device immediately clears the error.

Action-Not Available
Vendor-silabssilabs.com
Product-bluetooth_low_energy_software_development_kitBluetooth SDK
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2023-2686
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-9.8||CRITICAL
EPSS-0.12% / 31.75%
||
7 Day CHG~0.00%
Published-15 Jun, 2023 | 19:00
Updated-12 Dec, 2024 | 16:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Wi-Fi Commissioning MicriumOS example in Silicon Labs Gecko SDK v4.2.3 or earlier allows connected device to write payload onto the stack.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGecko Platform
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-2687
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-2.9||LOW
EPSS-0.04% / 11.14%
||
7 Day CHG~0.00%
Published-02 Jun, 2023 | 15:56
Updated-08 Jan, 2025 | 17:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Platform CLI component in Silicon Labs Gecko SDK v4.2.1 and earlier allows user to overwrite limited structures on the heap.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGecko SDK
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2023-32100
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.74%
||
7 Day CHG~0.00%
Published-18 May, 2023 | 18:47
Updated-21 Jan, 2025 | 21:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Key duplication in GSDK

Compiler removal of buffer clearing in sli_se_driver_mac_compute in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGecko Platform
CWE ID-CWE-14
Compiler Removal of Code to Clear Buffers
CVE-2023-32099
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.74%
||
7 Day CHG~0.00%
Published-18 May, 2023 | 18:46
Updated-21 Jan, 2025 | 21:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Key duplication in GSDK

Compiler removal of buffer clearing in sli_se_sign_hash in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGecko Platform
CWE ID-CWE-14
Compiler Removal of Code to Clear Buffers
CVE-2023-32098
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.74%
||
7 Day CHG~0.00%
Published-18 May, 2023 | 18:46
Updated-21 Jan, 2025 | 21:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Key duplication in GSDK

Compiler removal of buffer clearing in sli_se_sign_message in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGecko Platform
CWE ID-CWE-14
Compiler Removal of Code to Clear Buffers
CVE-2023-32097
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-3.1||LOW
EPSS-0.08% / 24.80%
||
7 Day CHG~0.00%
Published-18 May, 2023 | 18:45
Updated-21 Jan, 2025 | 21:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Key duplication in GSDK

Compiler removal of buffer clearing in sli_crypto_transparent_aead_decrypt_tag in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGecko Platform
CWE ID-CWE-14
Compiler Removal of Code to Clear Buffers
CVE-2023-32096
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-3.1||LOW
EPSS-0.08% / 24.80%
||
7 Day CHG~0.00%
Published-18 May, 2023 | 18:45
Updated-21 Jan, 2025 | 21:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Key duplication in GSDK

Compiler removal of buffer clearing in sli_crypto_transparent_aead_encrypt_tag in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGecko Platform
CWE ID-CWE-14
Compiler Removal of Code to Clear Buffers
CVE-2023-2481
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.74%
||
7 Day CHG~0.00%
Published-18 May, 2023 | 18:44
Updated-21 Jan, 2025 | 21:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Key duplication in GSDK

Compiler removal of buffer clearing in sli_se_opaque_import_key in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGecko Platform
CWE ID-CWE-14
Compiler Removal of Code to Clear Buffers
CVE-2023-1132
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-5.3||MEDIUM
EPSS-0.07% / 22.70%
||
7 Day CHG~0.00%
Published-18 May, 2023 | 18:44
Updated-22 Jan, 2025 | 14:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Key duplication in GSDK

Compiler removal of buffer clearing in sli_se_driver_key_agreement in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGecko Platform
CWE ID-CWE-14
Compiler Removal of Code to Clear Buffers
CVE-2023-0965
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-3.1||LOW
EPSS-0.07% / 21.69%
||
7 Day CHG~0.00%
Published-18 May, 2023 | 18:38
Updated-22 Jan, 2025 | 14:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Key duplication in GSDK

Compiler removal of buffer clearing in sli_cryptoacc_transparent_key_agreement in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGecko Platform
CWE ID-CWE-14
Compiler Removal of Code to Clear Buffers
CVE-2023-0775
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 7.60%
||
7 Day CHG~0.00%
Published-28 Mar, 2023 | 16:23
Updated-18 Feb, 2025 | 20:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bluetooth LE Invalid prepare write request command leads to denial of service

An invalid ‘prepare write request’ command can cause the Bluetooth LE stack to run out of memory and fail to be able to handle subsequent connection requests, resulting in a denial-of-service.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGSDK
CWE ID-CWE-20
Improper Input Validation
CVE-2023-1262
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-8.2||HIGH
EPSS-0.06% / 17.75%
||
7 Day CHG~0.00%
Published-21 Mar, 2023 | 20:30
Updated-26 Feb, 2025 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing MAC layer security in Wi-SUN Linux Border Router

Missing MAC layer security in Silicon Labs Wi-SUN Linux Border Router v1.5.2 and earlier allows malicious node to route malicious messages through network.

Action-Not Available
Vendor-silabssilabs.com
Product-wireless_smart_ubiquitous_network_linux_border_router_firmwarewireless_smart_ubiquitous_network_linux_border_routerWi-SUN Linux Border Router
CWE ID-CWE-862
Missing Authorization
CVE-2023-1261
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-8.2||HIGH
EPSS-0.06% / 17.75%
||
7 Day CHG~0.00%
Published-21 Mar, 2023 | 20:26
Updated-26 Feb, 2025 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing MAC layer security in Wi-SUN SDK

Missing MAC layer security in Silicon Labs Wi-SUN SDK v1.5.0 and earlier allows malicious node to route malicious messages through network.

Action-Not Available
Vendor-silabssilabs.com
Product-wi-sun_software_development_kitWi-SUN SDK
CWE ID-CWE-862
Missing Authorization
CVE-2022-24939
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-5.7||MEDIUM
EPSS-0.11% / 29.28%
||
7 Day CHG~0.00%
Published-17 Nov, 2022 | 23:35
Updated-29 Apr, 2025 | 15:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Malformed Zigbee packet with invalid destination address causes Assert

 A malformed packet containing an invalid destination address, causes a stack overflow in the Ember ZNet stack. This causes an assert which leads to a reset, immediately clearing the error.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitzigbee_emberznetEmber ZNet
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-24938
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-6.5||MEDIUM
EPSS-0.29% / 51.94%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 17:37
Updated-30 Apr, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Malformed Zigbee packet causes Assert in EmberZNet 7.0.1 or earlier

A malformed packet causes a stack overflow in the Ember ZNet stack. This causes an assert which leads to a reset, immediately clearing the error.

Action-Not Available
Vendor-silabssilabs.com
Product-emberznetEmber ZNet
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-24937
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-6.5||MEDIUM
EPSS-0.24% / 47.35%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 17:22
Updated-30 Apr, 2025 | 18:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Malformed Zigbee packet causes Assert in EmberZNet 7.0.0 or earlier

Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Silicon Labs Ember ZNet allows Overflow Buffers.

Action-Not Available
Vendor-silabsSilicon Labs
Product-emberznetEmber ZNet
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-24942
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-9.1||CRITICAL
EPSS-4.43% / 88.61%
||
7 Day CHG~0.00%
Published-02 Nov, 2022 | 21:04
Updated-05 May, 2025 | 13:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap-based buffer overflow in MicriumOS HTTP Server allows potential remote code execution

Heap based buffer overflow in HTTP Server functionality in Micrium uC-HTTP 3.01.01 allows remote code execution via HTTP request.

Action-Not Available
Vendor-silabssilabs.com
Product-micrium_uc-httpGecko Platform
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-24936
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-8.3||HIGH
EPSS-0.22% / 44.66%
||
7 Day CHG~0.00%
Published-02 Nov, 2022 | 17:25
Updated-02 May, 2025 | 16:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Gecko Standalone Bootloader vulnerability may allow bypassing application secure boot in some Series 2 devices

Out-of-Bounds error in GBL parser in Silicon Labs Gecko Bootloader version 4.0.1 and earlier allows attacker to overwrite flash Sign key and OTA decryption key via malicious bootloader upgrade.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_bootloaderGecko Bootloader
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-24611
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.18% / 39.46%
||
7 Day CHG~0.00%
Published-17 May, 2022 | 17:28
Updated-03 Aug, 2024 | 04:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Denial of Service (DoS) in the Z-Wave S0 NonceGet protocol specification in Silicon Labs Z-Wave 500 series allows local attackers to block S0/S2 protected Z-Wave network via crafted S0 NonceGet Z-Wave packages, utilizing included but absent NodeIDs.

Action-Not Available
Vendor-silabsn/a
Product-sd3502sd3502_firmwarezm5101_firmwarezm5304_firmwarezm5304sd3503_firmwarezm5101sd3503zm5202zm5202_firmwaren/a
CVE-2021-27411
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.5||MEDIUM
EPSS-0.21% / 43.79%
||
7 Day CHG~0.00%
Published-03 May, 2022 | 20:18
Updated-16 Apr, 2025 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Micrium OS Integer Overflow or Wraparound

Micrium OS Versions 5.10.1 and prior are vulnerable to integer wrap-around in functions Mem_DynPoolCreate, Mem_DynPoolCreateHW and Mem_PoolCreate. This unverified memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as very small blocks of memory being allocated instead of very large ones.

Action-Not Available
Vendor-silabsMicrium
Product-micrium_osMicrium OS
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2018-25029
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.1||HIGH
EPSS-0.09% / 27.10%
||
7 Day CHG~0.00%
Published-04 Feb, 2022 | 22:33
Updated-17 Sep, 2024 | 03:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic.

Action-Not Available
Vendor-silabsSilicon Labs
Product-zgm130s037hgnzm5101_firmwarezgm2305a27hgnzgm230sb27hgn_firmwarezm5101zgm230sb27hgnzgm130s037hgn_firmwarezgm2305a27hgn_firmwarezm5202zm5202_firmwareZ-Wave
CWE ID-CWE-757
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
CVE-2013-20003
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.3||HIGH
EPSS-0.14% / 34.78%
||
7 Day CHG~0.00%
Published-04 Feb, 2022 | 22:33
Updated-16 Sep, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Z-Wave devices from Sierra Designs (circa 2013) and Silicon Labs (using S0 security) may use a known, shared network key of all zeros, allowing an attacker within radio range to spoof Z-Wave traffic.

Action-Not Available
Vendor-silabsSilicon LabsSierra Designs
Product-zgm130s037hgnzm5101_firmwarezgm2305a27hgnzgm230sb27hgn_firmwarezm5101zgm230sb27hgnzgm130s037hgn_firmwarezgm2305a27hgn_firmwarezm5202zm5202_firmwareZ-Wave
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE ID-CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CVE-2020-10137
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.15% / 36.34%
||
7 Day CHG~0.00%
Published-09 Jan, 2022 | 04:15
Updated-16 Sep, 2024 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Z-Wave devices based on Silicon Labs 700 series chipsets using S2 do not adequately authenticate or encrypt FIND_NODE_IN_RANGE frames, allowing a remote, unauthenticated attacker to inject a FIND_NODE_IN_RANGE frame with an invalid random payload, denying service by blocking the processing of upcoming events.

Action-Not Available
Vendor-silabsSilicon Labs
Product-uzb-7700_series_firmwareUZB-7
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2020-9061
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 34.96%
||
7 Day CHG~0.00%
Published-07 Jan, 2022 | 04:30
Updated-17 Sep, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Z-Wave devices using Silicon Labs 500 and 700 series chipsets, including but not likely limited to the SiLabs UZB-7 version 7.00, ZooZ ZST10 version 6.04, Aeon Labs ZW090-A version 3.95, and Samsung STH-ETH-200 version 6.04, are susceptible to denial of service via malformed routing messages.

Action-Not Available
Vendor-aeoteczoozsilabsAeon LabsZooZSilicon LabsSamsung
Product-sth-eth-200uzb-7zst10500_series_firmwarezw090-a700_series_firmware700 seriesSTH-ETH-200ZW090-A500 seriesUZB-7ZST10
CWE ID-CWE-285
Improper Authorization
CVE-2020-9060
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 17.34%
||
7 Day CHG~0.00%
Published-07 Jan, 2022 | 04:30
Updated-16 Sep, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Z-Wave devices based on Silicon Labs 500 series chipsets using S2, including but likely not limited to the ZooZ ZST10 version 6.04, ZooZ ZEN20 version 5.03, ZooZ ZEN25 version 5.03, Aeon Labs ZW090-A version 3.95, and Fibaro FGWPB-111 version 4.3, are susceptible to denial of service and resource exhaustion via malformed SECURITY NONCE GET, SECURITY NONCE GET 2, NO OPERATION, or NIF REQUEST messages.

Action-Not Available
Vendor-fibaroaeoteczoozsilabsFibaroAeon LabsZooZSilicon Labs
Product-zen25zst10500_series_firmwarezw090-azen20fgwpb-111ZEN25FGWPB-111ZW090-A500 seriesZEN20ZST10
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-346
Origin Validation Error
CVE-2020-9059
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.19% / 40.69%
||
7 Day CHG~0.00%
Published-07 Jan, 2022 | 04:30
Updated-16 Sep, 2024 | 19:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Z-Wave devices based on Silicon Labs 500 series chipsets using S0 authentication are susceptible to uncontrolled resource consumption leading to battery exhaustion. As an example, the Schlage BE468 version 3.42 door lock is vulnerable and fails open at a low battery level.

Action-Not Available
Vendor-schlagesilabsSchlageSilicon Labs
Product-500_series_firmwarebe468BE468500 series
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2020-9058
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.1||HIGH
EPSS-0.03% / 5.28%
||
7 Day CHG~0.00%
Published-07 Jan, 2022 | 04:30
Updated-16 Sep, 2024 | 23:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Z-Wave devices based on Silicon Labs 500 series chipsets using CRC-16 encapsulation, including but likely not limited to the Linear LB60Z-1 version 3.5, Dome DM501 version 4.26, and Jasco ZW4201 version 4.05, do not implement encryption or replay protection.

Action-Not Available
Vendor-domelinearjascosilabsLinearDomeSilicon LabsJasco
Product-lb60z-1dm501zw4201500_series_firmwareLB60Z-1DM501ZW4201500 series
CWE ID-CWE-311
Missing Encryption of Sensitive Data
CVE-2020-9057
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.8||HIGH
EPSS-0.04% / 10.28%
||
7 Day CHG~0.00%
Published-07 Jan, 2022 | 04:30
Updated-16 Sep, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Z-Wave devices based on Silicon Labs 100, 200, and 300 series chipsets do not support encryption, allowing an attacker within radio range to take control of or cause a denial of service to a vulnerable device. An attacker can also capture and replay Z-Wave traffic. Firmware upgrades cannot directly address this vulnerability as it is an issue with the Z-Wave specification for these legacy chipsets. One way to protect against this vulnerability is to use 500 or 700 series chipsets that support Security 2 (S2) encryption. As examples, the Linear WADWAZ-1 version 3.43 and WAPIRZ-1 version 3.43 (with 300 series chipsets) are vulnerable.

Action-Not Available
Vendor-linearsilabsLinearSilicon Labs
Product-300_series_firmwarewadwaz-1200_series_firmware100_series_firmwarewapirz-1300 seriesWADWAZ-1WAPIRZ-1100 series200 series
CWE ID-CWE-311
Missing Encryption of Sensitive Data
CVE-2021-31609
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.13% / 33.05%
||
7 Day CHG~0.00%
Published-07 Sep, 2021 | 06:30
Updated-03 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Bluetooth Classic implementation in Silicon Labs iWRAP 6.3.0 and earlier does not properly handle the reception of an oversized LMP packet greater than 17 bytes, allowing attackers in radio range to trigger a crash in WT32i via a crafted LMP packet.

Action-Not Available
Vendor-silabsn/a
Product-wt32i-aiwrapn/a
CVE-2020-13582
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.6||HIGH
EPSS-4.90% / 89.19%
||
7 Day CHG~0.00%
Published-26 Jan, 2021 | 18:15
Updated-04 Aug, 2024 | 12:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial-of-service vulnerability exists in the HTTP Server functionality of Micrium uC-HTTP 3.01.00. A specially crafted HTTP request can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability.

Action-Not Available
Vendor-silabsn/a
Product-micrium_uc-httpMicrium
CWE ID-CWE-690
Unchecked Return Value to NULL Pointer Dereference
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2020-15531
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-9.72% / 92.62%
||
7 Day CHG~0.00%
Published-19 Aug, 2020 | 19:22
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Silicon Labs Bluetooth Low Energy SDK before 2.13.3 has a buffer overflow via packet data. This is an over-the-air remote code execution vulnerability in Bluetooth LE in EFR32 SoCs and associated modules running Bluetooth SDK, supporting Central or Observer roles.

Action-Not Available
Vendor-silabsn/a
Product-bluetooth_low_energy_software_development_kitn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-15532
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 34.92%
||
7 Day CHG~0.00%
Published-19 Aug, 2020 | 18:59
Updated-04 Aug, 2024 | 13:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Silicon Labs Bluetooth Low Energy SDK before 2.13.3 has a buffer overflow via packet data. This is an over-the-air denial of service vulnerability in Bluetooth LE in EFR32 SoCs and associated modules running Bluetooth SDK, supporting Central or Observer roles.

Action-Not Available
Vendor-silabsn/a
Product-bluetooth_low_energy_software_development_kitn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2018-19983
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.08% / 25.31%
||
7 Day CHG~0.00%
Published-09 Dec, 2018 | 19:00
Updated-05 Aug, 2024 | 11:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Sigma Design Z-Wave S0 through S2 devices. An attacker first prepares a Z-Wave frame-transmission program (e.g., Z-Wave PC Controller, OpenZWave, CC1110, etc.). Next, the attacker conducts a DoS attack against the Z-Wave S0 Security version product by continuously sending divided "Nonce Get (0x98 0x81)" frames. The reason for dividing the "Nonce Get" frame is that, in security version S0, when a node receives a "Nonce Get" frame, the node produces a random new nonce and sends it to the Src node of the received "Nonce Get" frame. After the nonce value is generated and transmitted, the node transitions to wait mode. At this time, when "Nonce Get" is received again, the node discards the previous nonce value and generates a random nonce again. Therefore, because the frame is encrypted with previous nonce value, the received normal frame cannot be decrypted.

Action-Not Available
Vendor-silabsn/a
Product-z-wave_s0z-wave_s0_firmwarez-wave_s2_firmwarez-wave_s2n/a
CWE ID-CWE-330
Use of Insufficiently Random Values
  • Previous
  • 1
  • 2
  • Next