The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic.
References
| Link | Resource |
|---|---|
| https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure | Third Party Advisory |
| https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/ | Exploit Third Party Advisory |
| https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure | Third Party Advisory |
| https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
21 Nov 2024, 04:03
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure - Third Party Advisory | |
| References | () https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/ - Exploit, Third Party Advisory |
09 Feb 2022, 15:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | (CONFIRM) https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure - Third Party Advisory | |
| References | (MISC) https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/ - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:* cpe:2.3:h:silabs:zm5101:-:*:*:*:*:*:*:* cpe:2.3:h:silabs:zm5202:-:*:*:*:*:*:*:* cpe:2.3:o:silabs:zgm230sb27hgn_firmware:s2:*:*:*:*:*:*:* cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:* cpe:2.3:o:silabs:zgm130s037hgn_firmware:s2:*:*:*:*:*:*:* cpe:2.3:h:silabs:zgm2305a27hgn:-:*:*:*:*:*:*:* cpe:2.3:o:silabs:zm5101_firmware:s2:*:*:*:*:*:*:* cpe:2.3:o:silabs:zm5202_firmware:s2:*:*:*:*:*:*:* cpe:2.3:o:silabs:zgm2305a27hgn_firmware:s2:*:*:*:*:*:*:* |
|
| CWE | NVD-CWE-Other | |
| CVSS |
v2 : v3 : |
v2 : 4.8
v3 : 8.1 |
04 Feb 2022, 23:28
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-02-04 23:15
Updated : 2024-11-21 04:03
NVD link : CVE-2018-25029
Mitre link : CVE-2018-25029
CVE.ORG link : CVE-2018-25029
JSON object : View
Products Affected
silabs
- zgm130s037hgn_firmware
- zm5202_firmware
- zm5202
- zgm130s037hgn
- zgm230sb27hgn
- zm5101_firmware
- zgm2305a27hgn
- zm5101
- zgm2305a27hgn_firmware
- zgm230sb27hgn_firmware
CWE
