Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
24 vulnerabilities found for z-wave_software_development_kit by silabs
FKIE_CVE-2024-50924
Vulnerability from fkie_nvd - Published: 2024-12-10 19:15 - Updated: 2025-07-01 15:28
Severity ?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause disrupt communications between the controller and the device itself via repeatedly sending crafted packets to the controller.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/CNK2100/2024-CVE/blob/main/README.md | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:silabs:z-wave_software_development_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3939A08E-08C2-46E4-A78E-0D8DC840F414",
"versionEndIncluding": "7.21.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:silabs:efr32zg14p231f256gm32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2DFB610-ABC0-4BF9-AB1B-EBE6919306A1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A25C5C4-EC69-4A14-9DBC-43CF3575D42A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE85974A-943D-4F65-83C7-2F348EFB8D73",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E572162D-C2AF-4859-BA1F-44312C441964",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53BC1B3E-F501-48D4-8677-9DA3E0FAA1DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6FF1AE-BD40-42F4-BFA6-3EAB981B53A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80565B28-70B9-4085-AA23-9FFAA32847A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b011f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF915B76-59C2-48E3-A718-95D8EBF30DC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF75E38-325F-4E8F-AA55-5D68C1C81B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13584AB6-3E8C-417C-A713-AD2BC826C1DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b021f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D96B8612-8818-40B4-BB02-3E29C5A8EBFF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57708CEA-8CF3-4FAF-A7D4-8572EE7A7E53",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm230sa27hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93C8AAF3-390E-4755-BEB3-789AECE5A04E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5794CE0B-4A2F-439F-A6DF-42A710E35D89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause disrupt communications between the controller and the device itself via repeatedly sending crafted packets to the controller."
},
{
"lang": "es",
"value": "Los permisos inseguros en Silicon Labs (SiLabs) Z-Wave Series 700 y 800 v7.21.1 permiten a los atacantes interrumpir las comunicaciones entre el controlador y el dispositivo en s\u00ed mediante el env\u00edo repetido de paquetes manipulados al controlador."
}
],
"id": "CVE-2024-50924",
"lastModified": "2025-07-01T15:28:52.527",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-12-10T19:15:30.463",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-281"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-50928
Vulnerability from fkie_nvd - Published: 2024-12-10 19:15 - Updated: 2025-07-01 15:32
Severity ?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to change the wakeup interval of end devices in controller memory, disrupting the device's communications with the controller.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/CNK2100/2024-CVE/blob/main/README.md | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:silabs:z-wave_software_development_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF36372-E7C1-49F6-97C5-412CCD9771C3",
"versionEndIncluding": "7.21.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:silabs:efr32zg14p231f256gm32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2DFB610-ABC0-4BF9-AB1B-EBE6919306A1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A25C5C4-EC69-4A14-9DBC-43CF3575D42A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE85974A-943D-4F65-83C7-2F348EFB8D73",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E572162D-C2AF-4859-BA1F-44312C441964",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53BC1B3E-F501-48D4-8677-9DA3E0FAA1DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6FF1AE-BD40-42F4-BFA6-3EAB981B53A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80565B28-70B9-4085-AA23-9FFAA32847A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b011f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF915B76-59C2-48E3-A718-95D8EBF30DC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF75E38-325F-4E8F-AA55-5D68C1C81B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13584AB6-3E8C-417C-A713-AD2BC826C1DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b021f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D96B8612-8818-40B4-BB02-3E29C5A8EBFF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57708CEA-8CF3-4FAF-A7D4-8572EE7A7E53",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm230sa27hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93C8AAF3-390E-4755-BEB3-789AECE5A04E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5794CE0B-4A2F-439F-A6DF-42A710E35D89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to change the wakeup interval of end devices in controller memory, disrupting the device\u0027s communications with the controller."
},
{
"lang": "es",
"value": "Los permisos inseguros en Silicon Labs (SiLabs) Z-Wave Series 700 y 800 v7.21.1 permiten a los atacantes cambiar el intervalo de activaci\u00f3n de los dispositivos finales en la memoria del controlador, interrumpiendo las comunicaciones del dispositivo con el controlador."
}
],
"id": "CVE-2024-50928",
"lastModified": "2025-07-01T15:32:13.433",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-12-10T19:15:30.550",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-281"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-50931
Vulnerability from fkie_nvd - Published: 2024-12-10 19:15 - Updated: 2025-07-01 14:10
Severity ?
Summary
Silicon Labs Z-Wave Series 500 v6.84.0 was discovered to contain insecure permissions.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/CNK2100/2024-CVE/blob/main/README.md | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:silabs:z-wave_software_development_kit:6.84.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF41CAEB-8527-4508-8B5C-7C2D6B56AC02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:silabs:zm5101:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36D7DA65-1F1E-4C1C-A9EB-16F615E5C34A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zm5202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64DAB9DC-A25C-4C7B-8A98-D6AAD3DF46CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Silicon Labs Z-Wave Series 500 v6.84.0 was discovered to contain insecure permissions."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Silicon Labs Z-Wave Series 500 v6.84.0 conten\u00eda permisos inseguros."
}
],
"id": "CVE-2024-50931",
"lastModified": "2025-07-01T14:10:47.570",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-12-10T19:15:30.813",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-281"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-50929
Vulnerability from fkie_nvd - Published: 2024-12-10 19:15 - Updated: 2025-07-01 15:32
Severity ?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to arbitrarily change the device type in the controller's memory, leading to a Denial of Service (DoS).
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/CNK2100/2024-CVE/blob/main/README.md | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:silabs:z-wave_software_development_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF36372-E7C1-49F6-97C5-412CCD9771C3",
"versionEndIncluding": "7.21.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:silabs:efr32zg14p231f256gm32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2DFB610-ABC0-4BF9-AB1B-EBE6919306A1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A25C5C4-EC69-4A14-9DBC-43CF3575D42A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE85974A-943D-4F65-83C7-2F348EFB8D73",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E572162D-C2AF-4859-BA1F-44312C441964",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53BC1B3E-F501-48D4-8677-9DA3E0FAA1DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6FF1AE-BD40-42F4-BFA6-3EAB981B53A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80565B28-70B9-4085-AA23-9FFAA32847A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b011f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF915B76-59C2-48E3-A718-95D8EBF30DC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF75E38-325F-4E8F-AA55-5D68C1C81B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13584AB6-3E8C-417C-A713-AD2BC826C1DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b021f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D96B8612-8818-40B4-BB02-3E29C5A8EBFF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57708CEA-8CF3-4FAF-A7D4-8572EE7A7E53",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm230sa27hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93C8AAF3-390E-4755-BEB3-789AECE5A04E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5794CE0B-4A2F-439F-A6DF-42A710E35D89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to arbitrarily change the device type in the controller\u0027s memory, leading to a Denial of Service (DoS)."
},
{
"lang": "es",
"value": "Los permisos inseguros en Silicon Labs (SiLabs) Z-Wave Series 700 y 800 v7.21.1 permiten a los atacantes cambiar arbitrariamente el tipo de dispositivo en la memoria del controlador, lo que lleva a una denegaci\u00f3n de servicio (DoS)."
}
],
"id": "CVE-2024-50929",
"lastModified": "2025-07-01T15:32:36.967",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-12-10T19:15:30.643",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-281"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-50930
Vulnerability from fkie_nvd - Published: 2024-12-10 19:15 - Updated: 2025-07-01 14:10
Severity ?
Summary
An issue in Silicon Labs Z-Wave Series 500 v6.84.0 allows attackers to execute arbitrary code.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/CNK2100/2024-CVE/blob/main/README.md | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:silabs:z-wave_software_development_kit:6.84.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF41CAEB-8527-4508-8B5C-7C2D6B56AC02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:silabs:zm5101:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36D7DA65-1F1E-4C1C-A9EB-16F615E5C34A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zm5202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64DAB9DC-A25C-4C7B-8A98-D6AAD3DF46CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Silicon Labs Z-Wave Series 500 v6.84.0 allows attackers to execute arbitrary code."
},
{
"lang": "es",
"value": "Un problema en Silicon Labs Z-Wave Series 500 v6.84.0 permite a los atacantes ejecutar c\u00f3digo arbitrario."
}
],
"id": "CVE-2024-50930",
"lastModified": "2025-07-01T14:10:51.477",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-12-10T19:15:30.727",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-281"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-50920
Vulnerability from fkie_nvd - Published: 2024-12-10 19:15 - Updated: 2025-07-01 15:28
Severity ?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to create a fake node via supplying crafted packets.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/CNK2100/2024-CVE/blob/main/README.md | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:silabs:z-wave_software_development_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3939A08E-08C2-46E4-A78E-0D8DC840F414",
"versionEndIncluding": "7.21.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:silabs:efr32zg14p231f256gm32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2DFB610-ABC0-4BF9-AB1B-EBE6919306A1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A25C5C4-EC69-4A14-9DBC-43CF3575D42A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE85974A-943D-4F65-83C7-2F348EFB8D73",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E572162D-C2AF-4859-BA1F-44312C441964",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53BC1B3E-F501-48D4-8677-9DA3E0FAA1DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6FF1AE-BD40-42F4-BFA6-3EAB981B53A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80565B28-70B9-4085-AA23-9FFAA32847A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b011f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF915B76-59C2-48E3-A718-95D8EBF30DC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF75E38-325F-4E8F-AA55-5D68C1C81B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13584AB6-3E8C-417C-A713-AD2BC826C1DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b021f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D96B8612-8818-40B4-BB02-3E29C5A8EBFF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57708CEA-8CF3-4FAF-A7D4-8572EE7A7E53",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm230sa27hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93C8AAF3-390E-4755-BEB3-789AECE5A04E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5794CE0B-4A2F-439F-A6DF-42A710E35D89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to create a fake node via supplying crafted packets."
},
{
"lang": "es",
"value": "Los permisos inseguros en Silicon Labs (SiLabs) Z-Wave Series 700 y 800 v7.21.1 permiten a los atacantes crear un nodo falso mediante el suministro de paquetes manipulados."
}
],
"id": "CVE-2024-50920",
"lastModified": "2025-07-01T15:28:22.123",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-12-10T19:15:30.290",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-281"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-50921
Vulnerability from fkie_nvd - Published: 2024-12-10 19:15 - Updated: 2025-07-01 15:28
Severity ?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause a Denial of Service (DoS) via repeatedly sending crafted packets to the controller.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/CNK2100/2024-CVE/blob/main/README.md | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:silabs:z-wave_software_development_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3939A08E-08C2-46E4-A78E-0D8DC840F414",
"versionEndIncluding": "7.21.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:silabs:efr32zg14p231f256gm32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2DFB610-ABC0-4BF9-AB1B-EBE6919306A1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A25C5C4-EC69-4A14-9DBC-43CF3575D42A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE85974A-943D-4F65-83C7-2F348EFB8D73",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E572162D-C2AF-4859-BA1F-44312C441964",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53BC1B3E-F501-48D4-8677-9DA3E0FAA1DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6FF1AE-BD40-42F4-BFA6-3EAB981B53A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80565B28-70B9-4085-AA23-9FFAA32847A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b011f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF915B76-59C2-48E3-A718-95D8EBF30DC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF75E38-325F-4E8F-AA55-5D68C1C81B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13584AB6-3E8C-417C-A713-AD2BC826C1DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b021f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D96B8612-8818-40B4-BB02-3E29C5A8EBFF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57708CEA-8CF3-4FAF-A7D4-8572EE7A7E53",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm230sa27hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93C8AAF3-390E-4755-BEB3-789AECE5A04E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5794CE0B-4A2F-439F-A6DF-42A710E35D89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause a Denial of Service (DoS) via repeatedly sending crafted packets to the controller."
},
{
"lang": "es",
"value": "Los permisos inseguros en Silicon Labs (SiLabs) Z-Wave Series 700 y 800 v7.21.1 permiten a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante el env\u00edo repetido de paquetes manipulados al controlador."
}
],
"id": "CVE-2024-50921",
"lastModified": "2025-07-01T15:28:43.840",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-12-10T19:15:30.380",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-281"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2023-5310
Vulnerability from fkie_nvd - Published: 2023-12-15 16:15 - Updated: 2024-11-21 08:41
Severity ?
5.7 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A denial of service vulnerability exists in all Silicon Labs Z-Wave controller and endpoint devices running Z-Wave SDK v7.20.3 (Gecko SDK v4.3.3) and earlier. This attack can be carried out only by devices on the network sending a stream of packets to the device.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| silabs | z-wave_software_development_kit | * | |
| silabs | z-wave_long_range_700 | - | |
| silabs | z-wave_long_range_800 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:silabs:z-wave_software_development_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "501E0DD5-542E-4338-B10A-8DC9DA158F56",
"versionEndIncluding": "7.20.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:silabs:z-wave_long_range_700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82CF7F87-FBE0-4173-ADA7-BC187486D2A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:z-wave_long_range_800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB5B24F-84B1-4738-B9CA-8D1D5EF192F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A denial of service vulnerability exists in all Silicon Labs Z-Wave controller and endpoint devices running Z-Wave SDK v7.20.3 (Gecko SDK v4.3.3) and earlier. This attack can be carried out only by devices on the network sending a stream of packets to the device."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio en todos los controladores y dispositivos de endpoint Z-Wave de Silicon Labs que ejecutan Z-Wave SDK v7.20.3 (Gecko SDK v4.3.3) y versiones anteriores. Este ataque solo puede ser llevado a cabo por dispositivos en la red que env\u00edan un flujo de paquetes al dispositivo."
}
],
"id": "CVE-2023-5310",
"lastModified": "2024-11-21T08:41:30.240",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6,
"source": "product-security@silabs.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-12-15T16:15:46.117",
"references": [
{
"source": "product-security@silabs.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/SiliconLabs/gecko_sdk/releases"
},
{
"source": "product-security@silabs.com",
"tags": [
"Permissions Required"
],
"url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/069Vm0000005E7EIAU?%20operationContext=S1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/SiliconLabs/gecko_sdk/releases"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/069Vm0000005E7EIAU?%20operationContext=S1"
}
],
"sourceIdentifier": "product-security@silabs.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-248"
}
],
"source": "product-security@silabs.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2024-50930 (GCVE-0-2024-50930)
Vulnerability from cvelistv5 – Published: 2024-12-10 00:00 – Updated: 2024-12-11 21:16
VLAI?
Summary
An issue in Silicon Labs Z-Wave Series 500 v6.84.0 allows attackers to execute arbitrary code.
Severity ?
8.8 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-50930",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T21:15:37.754511Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-281",
"description": "CWE-281 Improper Preservation of Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T21:16:48.205Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue in Silicon Labs Z-Wave Series 500 v6.84.0 allows attackers to execute arbitrary code."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T19:06:37.491Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-50930",
"datePublished": "2024-12-10T00:00:00.000Z",
"dateReserved": "2024-10-28T00:00:00.000Z",
"dateUpdated": "2024-12-11T21:16:48.205Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-50924 (GCVE-0-2024-50924)
Vulnerability from cvelistv5 – Published: 2024-12-10 00:00 – Updated: 2024-12-11 21:13
VLAI?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause disrupt communications between the controller and the device itself via repeatedly sending crafted packets to the controller.
Severity ?
6.5 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-50924",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T21:12:36.682819Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-281",
"description": "CWE-281 Improper Preservation of Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T21:13:11.234Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause disrupt communications between the controller and the device itself via repeatedly sending crafted packets to the controller."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T19:02:03.475Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-50924",
"datePublished": "2024-12-10T00:00:00.000Z",
"dateReserved": "2024-10-28T00:00:00.000Z",
"dateUpdated": "2024-12-11T21:13:11.234Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-50920 (GCVE-0-2024-50920)
Vulnerability from cvelistv5 – Published: 2024-12-10 00:00 – Updated: 2024-12-11 15:44
VLAI?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to create a fake node via supplying crafted packets.
Severity ?
8.8 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-50920",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T15:42:44.367613Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-281",
"description": "CWE-281 Improper Preservation of Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T15:44:04.751Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to create a fake node via supplying crafted packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T18:58:29.139Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-50920",
"datePublished": "2024-12-10T00:00:00.000Z",
"dateReserved": "2024-10-28T00:00:00.000Z",
"dateUpdated": "2024-12-11T15:44:04.751Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-50921 (GCVE-0-2024-50921)
Vulnerability from cvelistv5 – Published: 2024-12-10 00:00 – Updated: 2024-12-11 21:03
VLAI?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause a Denial of Service (DoS) via repeatedly sending crafted packets to the controller.
Severity ?
6.5 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-50921",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T20:59:36.294471Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-281",
"description": "CWE-281 Improper Preservation of Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T21:03:54.481Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause a Denial of Service (DoS) via repeatedly sending crafted packets to the controller."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T19:00:17.072Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-50921",
"datePublished": "2024-12-10T00:00:00.000Z",
"dateReserved": "2024-10-28T00:00:00.000Z",
"dateUpdated": "2024-12-11T21:03:54.481Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-50929 (GCVE-0-2024-50929)
Vulnerability from cvelistv5 – Published: 2024-12-10 00:00 – Updated: 2024-12-11 15:41
VLAI?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to arbitrarily change the device type in the controller's memory, leading to a Denial of Service (DoS).
Severity ?
6.2 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-50929",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T15:39:18.630707Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-281",
"description": "CWE-281 Improper Preservation of Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T15:41:41.300Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to arbitrarily change the device type in the controller\u0027s memory, leading to a Denial of Service (DoS)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T19:05:07.665Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-50929",
"datePublished": "2024-12-10T00:00:00.000Z",
"dateReserved": "2024-10-28T00:00:00.000Z",
"dateUpdated": "2024-12-11T15:41:41.300Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-50931 (GCVE-0-2024-50931)
Vulnerability from cvelistv5 – Published: 2024-12-10 00:00 – Updated: 2024-12-11 15:37
VLAI?
Summary
Silicon Labs Z-Wave Series 500 v6.84.0 was discovered to contain insecure permissions.
Severity ?
4.6 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-50931",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T15:37:47.664245Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-281",
"description": "CWE-281 Improper Preservation of Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T15:37:57.181Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Silicon Labs Z-Wave Series 500 v6.84.0 was discovered to contain insecure permissions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T19:07:56.450Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-50931",
"datePublished": "2024-12-10T00:00:00.000Z",
"dateReserved": "2024-10-28T00:00:00.000Z",
"dateUpdated": "2024-12-11T15:37:57.181Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-50928 (GCVE-0-2024-50928)
Vulnerability from cvelistv5 – Published: 2024-12-10 00:00 – Updated: 2024-12-11 21:14
VLAI?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to change the wakeup interval of end devices in controller memory, disrupting the device's communications with the controller.
Severity ?
6.5 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-50928",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T21:13:37.133914Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-281",
"description": "CWE-281 Improper Preservation of Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T21:14:18.191Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to change the wakeup interval of end devices in controller memory, disrupting the device\u0027s communications with the controller."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T19:03:39.020Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-50928",
"datePublished": "2024-12-10T00:00:00.000Z",
"dateReserved": "2024-10-28T00:00:00.000Z",
"dateUpdated": "2024-12-11T21:14:18.191Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-5310 (GCVE-0-2023-5310)
Vulnerability from cvelistv5 – Published: 2023-12-15 16:05 – Updated: 2024-10-08 14:15
VLAI?
Title
Z-Wave Denial of Service caused by Stream of Packets
Summary
A denial of service vulnerability exists in all Silicon Labs Z-Wave controller and endpoint devices running Z-Wave SDK v7.20.3 (Gecko SDK v4.3.3) and earlier. This attack can be carried out only by devices on the network sending a stream of packets to the device.
Severity ?
5.7 (Medium)
CWE
- CWE-248 - Uncaught Exception
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| silabs.com | Gecko SDK |
Affected:
0 , ≤ 7.20.3
(LessThan)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:52:08.559Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/SiliconLabs/gecko_sdk/releases"
},
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/069Vm0000005E7EIAU?%20operationContext=S1"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-5310",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-14T18:23:37.766666Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T14:15:42.486Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Gecko SDK",
"vendor": "silabs.com",
"versions": [
{
"lessThanOrEqual": "7.20.3",
"status": "affected",
"version": "0",
"versionType": "LessThan"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA denial of service vulnerability exists in all Silicon Labs Z-Wave controller and endpoint devices running Z-Wave SDK v7.20.3 (Gecko SDK v4.3.3) and earlier. This attack can be carried out only by devices on the network sending a stream of packets to the device.\u003c/span\u003e"
}
],
"value": "A denial of service vulnerability exists in all Silicon Labs Z-Wave controller and endpoint devices running Z-Wave SDK v7.20.3 (Gecko SDK v4.3.3) and earlier. This attack can be carried out only by devices on the network sending a stream of packets to the device."
}
],
"impacts": [
{
"capecId": "CAPEC-601",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-601 Jamming"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-248",
"description": "CWE-248 Uncaught Exception",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-27T15:44:43.455Z",
"orgId": "030b2754-1501-44a4-bef8-48be86a33bf4",
"shortName": "Silabs"
},
"references": [
{
"url": "https://github.com/SiliconLabs/gecko_sdk/releases"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/069Vm0000005E7EIAU?%20operationContext=S1"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Z-Wave Denial of Service caused by Stream of Packets",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4",
"assignerShortName": "Silabs",
"cveId": "CVE-2023-5310",
"datePublished": "2023-12-15T16:05:15.120Z",
"dateReserved": "2023-09-29T18:44:41.563Z",
"dateUpdated": "2024-10-08T14:15:42.486Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-50930 (GCVE-0-2024-50930)
Vulnerability from nvd – Published: 2024-12-10 00:00 – Updated: 2024-12-11 21:16
VLAI?
Summary
An issue in Silicon Labs Z-Wave Series 500 v6.84.0 allows attackers to execute arbitrary code.
Severity ?
8.8 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-50930",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T21:15:37.754511Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-281",
"description": "CWE-281 Improper Preservation of Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T21:16:48.205Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue in Silicon Labs Z-Wave Series 500 v6.84.0 allows attackers to execute arbitrary code."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T19:06:37.491Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-50930",
"datePublished": "2024-12-10T00:00:00.000Z",
"dateReserved": "2024-10-28T00:00:00.000Z",
"dateUpdated": "2024-12-11T21:16:48.205Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-50924 (GCVE-0-2024-50924)
Vulnerability from nvd – Published: 2024-12-10 00:00 – Updated: 2024-12-11 21:13
VLAI?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause disrupt communications between the controller and the device itself via repeatedly sending crafted packets to the controller.
Severity ?
6.5 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-50924",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T21:12:36.682819Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-281",
"description": "CWE-281 Improper Preservation of Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T21:13:11.234Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause disrupt communications between the controller and the device itself via repeatedly sending crafted packets to the controller."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T19:02:03.475Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-50924",
"datePublished": "2024-12-10T00:00:00.000Z",
"dateReserved": "2024-10-28T00:00:00.000Z",
"dateUpdated": "2024-12-11T21:13:11.234Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-50920 (GCVE-0-2024-50920)
Vulnerability from nvd – Published: 2024-12-10 00:00 – Updated: 2024-12-11 15:44
VLAI?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to create a fake node via supplying crafted packets.
Severity ?
8.8 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-50920",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T15:42:44.367613Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-281",
"description": "CWE-281 Improper Preservation of Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T15:44:04.751Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to create a fake node via supplying crafted packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T18:58:29.139Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-50920",
"datePublished": "2024-12-10T00:00:00.000Z",
"dateReserved": "2024-10-28T00:00:00.000Z",
"dateUpdated": "2024-12-11T15:44:04.751Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-50921 (GCVE-0-2024-50921)
Vulnerability from nvd – Published: 2024-12-10 00:00 – Updated: 2024-12-11 21:03
VLAI?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause a Denial of Service (DoS) via repeatedly sending crafted packets to the controller.
Severity ?
6.5 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-50921",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T20:59:36.294471Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-281",
"description": "CWE-281 Improper Preservation of Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T21:03:54.481Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause a Denial of Service (DoS) via repeatedly sending crafted packets to the controller."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T19:00:17.072Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-50921",
"datePublished": "2024-12-10T00:00:00.000Z",
"dateReserved": "2024-10-28T00:00:00.000Z",
"dateUpdated": "2024-12-11T21:03:54.481Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-50929 (GCVE-0-2024-50929)
Vulnerability from nvd – Published: 2024-12-10 00:00 – Updated: 2024-12-11 15:41
VLAI?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to arbitrarily change the device type in the controller's memory, leading to a Denial of Service (DoS).
Severity ?
6.2 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-50929",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T15:39:18.630707Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-281",
"description": "CWE-281 Improper Preservation of Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T15:41:41.300Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to arbitrarily change the device type in the controller\u0027s memory, leading to a Denial of Service (DoS)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T19:05:07.665Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-50929",
"datePublished": "2024-12-10T00:00:00.000Z",
"dateReserved": "2024-10-28T00:00:00.000Z",
"dateUpdated": "2024-12-11T15:41:41.300Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-50931 (GCVE-0-2024-50931)
Vulnerability from nvd – Published: 2024-12-10 00:00 – Updated: 2024-12-11 15:37
VLAI?
Summary
Silicon Labs Z-Wave Series 500 v6.84.0 was discovered to contain insecure permissions.
Severity ?
4.6 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-50931",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T15:37:47.664245Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-281",
"description": "CWE-281 Improper Preservation of Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T15:37:57.181Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Silicon Labs Z-Wave Series 500 v6.84.0 was discovered to contain insecure permissions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T19:07:56.450Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-50931",
"datePublished": "2024-12-10T00:00:00.000Z",
"dateReserved": "2024-10-28T00:00:00.000Z",
"dateUpdated": "2024-12-11T15:37:57.181Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-50928 (GCVE-0-2024-50928)
Vulnerability from nvd – Published: 2024-12-10 00:00 – Updated: 2024-12-11 21:14
VLAI?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to change the wakeup interval of end devices in controller memory, disrupting the device's communications with the controller.
Severity ?
6.5 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-50928",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T21:13:37.133914Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-281",
"description": "CWE-281 Improper Preservation of Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T21:14:18.191Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to change the wakeup interval of end devices in controller memory, disrupting the device\u0027s communications with the controller."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T19:03:39.020Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-50928",
"datePublished": "2024-12-10T00:00:00.000Z",
"dateReserved": "2024-10-28T00:00:00.000Z",
"dateUpdated": "2024-12-11T21:14:18.191Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-5310 (GCVE-0-2023-5310)
Vulnerability from nvd – Published: 2023-12-15 16:05 – Updated: 2024-10-08 14:15
VLAI?
Title
Z-Wave Denial of Service caused by Stream of Packets
Summary
A denial of service vulnerability exists in all Silicon Labs Z-Wave controller and endpoint devices running Z-Wave SDK v7.20.3 (Gecko SDK v4.3.3) and earlier. This attack can be carried out only by devices on the network sending a stream of packets to the device.
Severity ?
5.7 (Medium)
CWE
- CWE-248 - Uncaught Exception
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| silabs.com | Gecko SDK |
Affected:
0 , ≤ 7.20.3
(LessThan)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:52:08.559Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/SiliconLabs/gecko_sdk/releases"
},
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/069Vm0000005E7EIAU?%20operationContext=S1"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-5310",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-14T18:23:37.766666Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T14:15:42.486Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Gecko SDK",
"vendor": "silabs.com",
"versions": [
{
"lessThanOrEqual": "7.20.3",
"status": "affected",
"version": "0",
"versionType": "LessThan"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA denial of service vulnerability exists in all Silicon Labs Z-Wave controller and endpoint devices running Z-Wave SDK v7.20.3 (Gecko SDK v4.3.3) and earlier. This attack can be carried out only by devices on the network sending a stream of packets to the device.\u003c/span\u003e"
}
],
"value": "A denial of service vulnerability exists in all Silicon Labs Z-Wave controller and endpoint devices running Z-Wave SDK v7.20.3 (Gecko SDK v4.3.3) and earlier. This attack can be carried out only by devices on the network sending a stream of packets to the device."
}
],
"impacts": [
{
"capecId": "CAPEC-601",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-601 Jamming"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-248",
"description": "CWE-248 Uncaught Exception",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-27T15:44:43.455Z",
"orgId": "030b2754-1501-44a4-bef8-48be86a33bf4",
"shortName": "Silabs"
},
"references": [
{
"url": "https://github.com/SiliconLabs/gecko_sdk/releases"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/069Vm0000005E7EIAU?%20operationContext=S1"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Z-Wave Denial of Service caused by Stream of Packets",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4",
"assignerShortName": "Silabs",
"cveId": "CVE-2023-5310",
"datePublished": "2023-12-15T16:05:15.120Z",
"dateReserved": "2023-09-29T18:44:41.563Z",
"dateUpdated": "2024-10-08T14:15:42.486Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}