The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic.
References
Link | Resource |
---|---|
https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure | Third Party Advisory |
https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/ | Exploit Third Party Advisory |
https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure | Third Party Advisory |
https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 04:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure - Third Party Advisory | |
References | () https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/ - Exploit, Third Party Advisory |
09 Feb 2022, 15:45
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure - Third Party Advisory | |
References | (MISC) https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:* cpe:2.3:h:silabs:zm5101:-:*:*:*:*:*:*:* cpe:2.3:h:silabs:zm5202:-:*:*:*:*:*:*:* cpe:2.3:o:silabs:zgm230sb27hgn_firmware:s2:*:*:*:*:*:*:* cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:* cpe:2.3:o:silabs:zgm130s037hgn_firmware:s2:*:*:*:*:*:*:* cpe:2.3:h:silabs:zgm2305a27hgn:-:*:*:*:*:*:*:* cpe:2.3:o:silabs:zm5101_firmware:s2:*:*:*:*:*:*:* cpe:2.3:o:silabs:zm5202_firmware:s2:*:*:*:*:*:*:* cpe:2.3:o:silabs:zgm2305a27hgn_firmware:s2:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-Other | |
CVSS |
v2 : v3 : |
v2 : 4.8
v3 : 8.1 |
04 Feb 2022, 23:28
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-04 23:15
Updated : 2024-11-21 04:03
NVD link : CVE-2018-25029
Mitre link : CVE-2018-25029
CVE.ORG link : CVE-2018-25029
JSON object : View
Products Affected
silabs
- zgm230sb27hgn_firmware
- zgm130s037hgn
- zm5101
- zgm230sb27hgn
- zgm2305a27hgn_firmware
- zm5101_firmware
- zgm2305a27hgn
- zgm130s037hgn_firmware
- zm5202
- zm5202_firmware
CWE