CVE-2024-3052 – Z/IP Gateway S2 Nonce Get Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2024-3052
Malformed S2 Nonce Get command classes can be sent to crash the gateway. A hard reset is required to recover the gateway. Se pueden enviar clases de comando S2 Nonce Get con formato incorrecto para bloquear la puerta de enlace. Se requiere un reinicio completo para recuperar la puerta de enlace. • https://community.silabs.com/068Vm0000045w2j • CWE-248: Uncaught Exception CWE-754: Improper Check for Unusual or Exceptional Conditions •
CVE-2024-3051 – Z/IP Gateway Device Reset Locally Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2024-3051
Malformed Device Reset Locally command classes can be sent to temporarily deny service to an end device. Any frames sent by the end device will not be acknowledged by the gateway during this time. Restablecimiento de dispositivo con formato incorrecto Se pueden enviar clases de comando localmente para denegar temporalmente el servicio a un dispositivo final. La puerta de enlace no reconocerá ninguna trama enviada por el dispositivo final durante este tiempo. • https://community.silabs.com/068Vm0000045w2j • CWE-248: Uncaught Exception CWE-345: Insufficient Verification of Data Authenticity CWE-419: Unprotected Primary Channel CWE-754: Improper Check for Unusual or Exceptional Conditions •
CVE-2023-4489 – Z/IP Gateway Use of Uninitialized PRNG when Generating S0 Encryption Key
https://notcve.org/view.php?id=CVE-2023-4489
The first S0 encryption key is generated with an uninitialized PRNG in Z/IP Gateway products running Silicon Labs Z/IP Gateway SDK v7.18.3 and earlier. This makes the first S0 key generated at startup predictable, potentially allowing network key prediction and unauthorized S0 network access. La primera clave de cifrado S0 se genera con un PRNG no inicializado en productos Z/IP Gateway que ejecutan Silicon Labs Z/IP Gateway SDK v7.18.3 y versiones anteriores. Esto hace que la primera clave S0 generada al inicio sea predecible, lo que potencialmente permite la predicción de claves de red y el acceso no autorizado a la red S0. • https://github.com/SiliconLabs/gecko_sdk https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000buWj0QAE?operationContext=S1 • CWE-908: Use of Uninitialized Resource CWE-1279: Cryptographic Operations are run Before Supporting Units are Ready •
CVE-2023-0972 – Buffer overflow in S0 Decryption on Z/IP Gatweay
https://notcve.org/view.php?id=CVE-2023-0972
Description: A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution. • https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-125: Out-of-bounds Read CWE-787: Out-of-bounds Write •
CVE-2023-0971 – Command Authentication Bypass in Z/IP Gateway
https://notcve.org/view.php?id=CVE-2023-0971
A logic error in SiLabs Z/IP Gateway SDK 7.18.02 and earlier allows authentication to be bypassed, remote administration of Z-Wave controllers, and S0/S2 encryption keys to be recovered. • https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1 • CWE-268: Privilege Chaining CWE-269: Improper Privilege Management CWE-281: Improper Preservation of Permissions CWE-863: Incorrect Authorization •