CVE-2023-51392

Ember ZNet between v7.2.0 and v7.4.0 used software AES-CCM instead of integrated hardware cryptographic accelerators, potentially increasing risk of electromagnetic and differential power analysis sidechannel attacks.
References
Link Resource
https://community.silabs.com/068Vm000001BKm6 Permissions Required
https://community.silabs.com/068Vm000001BKm6 Permissions Required
Configurations

Configuration 1 (hide)

cpe:2.3:a:silabs:emberznet:*:*:*:*:*:*:*:*

History

12 Feb 2025, 18:49

Type Values Removed Values Added
CWE CWE-327
First Time Silabs
Silabs emberznet
CPE cpe:2.3:a:silabs:emberznet:*:*:*:*:*:*:*:*
References () https://community.silabs.com/068Vm000001BKm6 - () https://community.silabs.com/068Vm000001BKm6 - Permissions Required

21 Nov 2024, 08:38

Type Values Removed Values Added
References () https://community.silabs.com/068Vm000001BKm6 - () https://community.silabs.com/068Vm000001BKm6 -

27 Sep 2024, 16:15

Type Values Removed Values Added
Summary
  • (es) Ember ZNet entre v7.2.0 y v7.4.0 utilizó software AES-CCM en lugar de aceleradores criptográficos de hardware integrados, lo que potencialmente aumenta el riesgo de ataques de canal lateral de análisis de potencia diferencial y electromagnético.
CWE CWE-327 CWE-1240

23 Feb 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-23 17:15

Updated : 2025-02-12 18:49


NVD link : CVE-2023-51392

Mitre link : CVE-2023-51392

CVE.ORG link : CVE-2023-51392


JSON object : View

Products Affected

silabs

  • emberznet
CWE
CWE-1240

Use of a Risky Cryptographic Primitive

CWE-327

Use of a Broken or Risky Cryptographic Algorithm