CVE-2020-9057

Z-Wave devices based on Silicon Labs 100, 200, and 300 series chipsets do not support encryption, allowing an attacker within radio range to take control of or cause a denial of service to a vulnerable device. An attacker can also capture and replay Z-Wave traffic. Firmware upgrades cannot directly address this vulnerability as it is an issue with the Z-Wave specification for these legacy chipsets. One way to protect against this vulnerability is to use 500 or 700 series chipsets that support Security 2 (S2) encryption. As examples, the Linear WADWAZ-1 version 3.43 and WAPIRZ-1 version 3.43 (with 300 series chipsets) are vulnerable.
References
Link Resource
https://doi.org/10.1109/ACCESS.2021.3138768 Broken Link
https://github.com/CNK2100/VFuzz-public Third Party Advisory
https://ieeexplore.ieee.org/document/9663293 Broken Link
https://kb.cert.org/vuls/id/142629 Third Party Advisory US Government Resource
https://www.kb.cert.org/vuls/id/142629 Third Party Advisory US Government Resource
https://doi.org/10.1109/ACCESS.2021.3138768 Broken Link
https://github.com/CNK2100/VFuzz-public Third Party Advisory
https://ieeexplore.ieee.org/document/9663293 Broken Link
https://kb.cert.org/vuls/id/142629 Third Party Advisory US Government Resource
https://www.kb.cert.org/vuls/id/142629 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linear:wadwaz-1:3.43:*:*:*:*:*:*:*
cpe:2.3:o:linear:wapirz-1:3.43:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:silabs:100_series_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:silabs:200_series_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:silabs:300_series_firmware:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () https://doi.org/10.1109/ACCESS.2021.3138768 - Broken Link () https://doi.org/10.1109/ACCESS.2021.3138768 - Broken Link
References () https://github.com/CNK2100/VFuzz-public - Third Party Advisory () https://github.com/CNK2100/VFuzz-public - Third Party Advisory
References () https://ieeexplore.ieee.org/document/9663293 - Broken Link () https://ieeexplore.ieee.org/document/9663293 - Broken Link
References () https://kb.cert.org/vuls/id/142629 - Third Party Advisory, US Government Resource () https://kb.cert.org/vuls/id/142629 - Third Party Advisory, US Government Resource
References () https://www.kb.cert.org/vuls/id/142629 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/142629 - Third Party Advisory, US Government Resource

Information

Published : 2022-01-10 14:10

Updated : 2024-11-21 05:39


NVD link : CVE-2020-9057

Mitre link : CVE-2020-9057

CVE.ORG link : CVE-2020-9057


JSON object : View

Products Affected

silabs

  • 100_series_firmware
  • 300_series_firmware
  • 200_series_firmware

linear

  • wapirz-1
  • wadwaz-1
CWE
CWE-311

Missing Encryption of Sensitive Data