Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-9057

Опубликовано: 10 янв. 2022
Источник: nvd
CVSS3: 8.8
CVSS2: 8.3
EPSS Низкий

Описание

Z-Wave devices based on Silicon Labs 100, 200, and 300 series chipsets do not support encryption, allowing an attacker within radio range to take control of or cause a denial of service to a vulnerable device. An attacker can also capture and replay Z-Wave traffic. Firmware upgrades cannot directly address this vulnerability as it is an issue with the Z-Wave specification for these legacy chipsets. One way to protect against this vulnerability is to use 500 or 700 series chipsets that support Security 2 (S2) encryption. As examples, the Linear WADWAZ-1 version 3.43 and WAPIRZ-1 version 3.43 (with 300 series chipsets) are vulnerable.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:linear:wadwaz-1:3.43:*:*:*:*:*:*:*
cpe:2.3:o:linear:wapirz-1:3.43:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:o:silabs:100_series_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:silabs:200_series_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:silabs:300_series_firmware:*:*:*:*:*:*:*:*

EPSS

Процентиль: 11%
0.00039
Низкий

8.8 High

CVSS3

8.3 High

CVSS2

Дефекты

CWE-311
CWE-311

Связанные уязвимости

github
около 4 лет назад

Z-Wave devices based on Silicon Labs 100, 200, and 300 series chipsets do not support encryption, allowing an attacker within radio range to take control of or cause a denial of service to a vulnerable device. An attacker can also capture and replay Z-Wave traffic. Firmware upgrades cannot directly address this vulnerability as it is an issue with the Z-Wave specification for these legacy chipsets. One way to protect against this vulnerability is to use 500 or 700 series chipsets that support Security 2 (S2) encryption. As examples, the Linear WADWAZ-1 version 3.43 and WAPIRZ-1 version 3.43 (with 300 series chipsets) are vulnerable.

EPSS

Процентиль: 11%
0.00039
Низкий

8.8 High

CVSS3

8.3 High

CVSS2

Дефекты

CWE-311
CWE-311