The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic.
References
Link | Resource |
---|---|
https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure | Third Party Advisory |
https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/ | Exploit Third Party Advisory |
https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure | Third Party Advisory |
https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 04:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure - Third Party Advisory | |
References | () https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/ - Exploit, Third Party Advisory |
Information
Published : 2022-02-04 23:15
Updated : 2024-11-21 04:03
NVD link : CVE-2018-25029
Mitre link : CVE-2018-25029
CVE.ORG link : CVE-2018-25029
JSON object : View
Products Affected
silabs
- zm5101
- zgm130s037hgn
- zgm230sb27hgn
- zgm130s037hgn_firmware
- zm5202_firmware
- zgm2305a27hgn_firmware
- zm5101_firmware
- zm5202
- zgm230sb27hgn_firmware
- zgm2305a27hgn
CWE