CVE-2018-25029

The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:silabs:zgm130s037hgn_firmware:s2:*:*:*:*:*:*:*
cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:silabs:zm5202_firmware:s2:*:*:*:*:*:*:*
cpe:2.3:h:silabs:zm5202:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:silabs:zm5101_firmware:s2:*:*:*:*:*:*:*
cpe:2.3:h:silabs:zm5101:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:silabs:zgm2305a27hgn_firmware:s2:*:*:*:*:*:*:*
cpe:2.3:h:silabs:zgm2305a27hgn:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:silabs:zgm230sb27hgn_firmware:s2:*:*:*:*:*:*:*
cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:03

Type Values Removed Values Added
References () https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure - Third Party Advisory () https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure - Third Party Advisory
References () https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/ - Exploit, Third Party Advisory () https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/ - Exploit, Third Party Advisory

Information

Published : 2022-02-04 23:15

Updated : 2024-11-21 04:03


NVD link : CVE-2018-25029

Mitre link : CVE-2018-25029

CVE.ORG link : CVE-2018-25029


JSON object : View

Products Affected

silabs

  • zm5101
  • zgm130s037hgn
  • zgm230sb27hgn
  • zgm130s037hgn_firmware
  • zm5202_firmware
  • zgm2305a27hgn_firmware
  • zm5101_firmware
  • zm5202
  • zgm230sb27hgn_firmware
  • zgm2305a27hgn
CWE
CWE-757

Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')

NVD-CWE-Other