Описание
A Zigbee Radio Co-Processor (RCP), which is using SiLabs EmberZNet Zigbee stack, was unable to send messages to the host system (CPCd) due to heavy Zigbee traffic, resulting in a Denial of Service (DoS) attack, Only hard reset will bring the device to normal operation
A Zigbee Radio Co-Processor (RCP), which is using SiLabs EmberZNet Zigbee stack, was unable to send messages to the host system (CPCd) due to heavy Zigbee traffic, resulting in a Denial of Service (DoS) attack, Only hard reset will bring the device to normal operation
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-1221
- https://community.silabs.com/068Vm00000Sadyn
- https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-7.4.4.0.pdf
- https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-8.0.2.0.pdf
- https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-8.1.0.0.pdf
Связанные уязвимости
A Zigbee Radio Co-Processor (RCP), which is using SiLabs EmberZNet Zigbee stack, was unable to send messages to the host system (CPCd) due to heavy Zigbee traffic, resulting in a Denial of Service (DoS) attack, Only hard reset will bring the device to normal operation