Z-Wave devices based on Silicon Labs 100, 200, and 300 series chipsets do not support encryption, allowing an attacker within radio range to take control of or cause a denial of service to a vulnerable device. An attacker can also capture and replay Z-Wave traffic. Firmware upgrades cannot directly address this vulnerability as it is an issue with the Z-Wave specification for these legacy chipsets. One way to protect against this vulnerability is to use 500 or 700 series chipsets that support Security 2 (S2) encryption. As examples, the Linear WADWAZ-1 version 3.43 and WAPIRZ-1 version 3.43 (with 300 series chipsets) are vulnerable.
References
Link | Resource |
---|---|
https://github.com/CNK2100/VFuzz-public | Third Party Advisory |
https://kb.cert.org/vuls/id/142629 | Third Party Advisory US Government Resource |
https://ieeexplore.ieee.org/document/9663293 | Broken Link |
https://doi.org/10.1109/ACCESS.2021.3138768 | Broken Link |
https://www.kb.cert.org/vuls/id/142629 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2022-01-10 06:10
Updated : 2022-01-18 09:10
NVD link : CVE-2020-9057
Mitre link : CVE-2020-9057
JSON object : View
CWE
CWE-311
Missing Encryption of Sensitive Data
Products Affected
linear
- wapirz-1
- wadwaz-1
silabs
- 100_series_firmware
- 300_series_firmware
- 200_series_firmware