The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic.
References
Link | Resource |
---|---|
https://community.silabs.com/s/share/a5U1M000000knqNUAQ/updated-your-zwave-smart-locks-are-safe-and-secure | Third Party Advisory |
https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Information
Published : 2022-02-04 15:15
Updated : 2022-02-09 07:45
NVD link : CVE-2018-25029
Mitre link : CVE-2018-25029
JSON object : View
CWE
Products Affected
silabs
- zm5202_firmware
- zm5202
- zgm230sb27hgn
- zgm130s037hgn_firmware
- zgm2305a27hgn
- zgm130s037hgn
- zm5101
- zm5101_firmware
- zgm230sb27hgn_firmware
- zgm2305a27hgn_firmware