// For flags

CVE-2020-9057

 

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Z-Wave devices based on Silicon Labs 100, 200, and 300 series chipsets do not support encryption, allowing an attacker within radio range to take control of or cause a denial of service to a vulnerable device. An attacker can also capture and replay Z-Wave traffic. Firmware upgrades cannot directly address this vulnerability as it is an issue with the Z-Wave specification for these legacy chipsets. One way to protect against this vulnerability is to use 500 or 700 series chipsets that support Security 2 (S2) encryption. As examples, the Linear WADWAZ-1 version 3.43 and WAPIRZ-1 version 3.43 (with 300 series chipsets) are vulnerable.

Los dispositivos Z-Wave basados en los conjuntos de chips de las series 100, 200 y 300 de Silicon Labs no admiten cifrado, permitiendo a un atacante dentro del alcance de la radio tomar el control o causar una denegación de servicio en un dispositivo vulnerable. Un atacante también puede capturar y reproducir el tráfico Z-Wave. Las actualizaciones de firmware no pueden abordar directamente esta vulnerabilidad, ya que es un problema con la especificación Z-Wave para estos conjuntos de chips heredados. Una forma de protegerse contra esta vulnerabilidad es usar los conjuntos de chips de las series 500 o 700 que soportan el cifrado de Seguridad 2 (S2). Como ejemplos, el Linear WADWAZ-1 versión 3.43 y WAPIRZ-1 versión 3.43 (con chipsets de la serie 300) son vulnerables

*Credits: Carlos Nkuba Kayembe, Kim Seulbae, Sven Dietrich, and Heejo Lee
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-02-18 CVE Reserved
  • 2022-01-07 CVE Published
  • 2024-09-16 CVE Updated
  • 2024-09-22 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-311: Missing Encryption of Sensitive Data
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linear
Search vendor "Linear"
Wadwaz-1
Search vendor "Linear" for product "Wadwaz-1"
3.43
Search vendor "Linear" for product "Wadwaz-1" and version "3.43"
-
Affected
Linear
Search vendor "Linear"
Wapirz-1
Search vendor "Linear" for product "Wapirz-1"
3.43
Search vendor "Linear" for product "Wapirz-1" and version "3.43"
-
Affected
Silabs
Search vendor "Silabs"
100 Series Firmware
Search vendor "Silabs" for product "100 Series Firmware"
*-
Affected
Silabs
Search vendor "Silabs"
200 Series Firmware
Search vendor "Silabs" for product "200 Series Firmware"
*-
Affected
Silabs
Search vendor "Silabs"
300 Series Firmware
Search vendor "Silabs" for product "300 Series Firmware"
*-
Affected