{"vuid":"VU#142629","idnumber":"142629","name":"Silicon Labs Z-Wave chipsets contain multiple vulnerabilities","keywords":null,"overview":"### Overview\r\nVarious Silicon Labs Z-Wave chipsets do not support encryption, can be downgraded to not use weaker encryption, and are vulnerable to denial of service. Some of these vulnerabilities are inherent in Z-Wave protocol specifications.\r\n\r\n### Description\r\nZ-Wave devices based on Silicon Labs chipsets have multiple vulnerabilities. For further details, including specific devices tested, see [Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes](https://ieeexplore.ieee.org/document/9663293).\r\n\r\n**CVE-2020-9057**  \r\nZ-Wave devices based on Silicon Labs 100, 200, and 300 series chipsets do not support encryption.\r\n\r\n**CVE-2020-9058**  \r\nZ-Wave devices based on Silicon Labs 500 series chipsets using CRC-16 encapsulation do not implement encryption or replay protection.\r\n\r\n**CVE-2020-9059**  \r\nZ-Wave devices based on Silicon Labs 500 series chipsets using S0 authentication are susceptible to uncontrolled resource consumption which can lead to battery exhaustion.\r\n\r\n**CVE-2020-9060**  \r\nZ-Wave devices based on Silicon Labs 500 series chipsets using S2 are susceptible to denial of service and resource exhaustion via malformed SECURITY NONCE GET, SECURITY NONCE GET 2, NO OPERATION, or NIF REQUEST messages.\r\n \r\n**CVE-2020-9061**  \r\nZ-Wave devices based on Silicon Labs 500 and 700 series chipsets are susceptible to denial of service via malformed routing messages.\r\n\r\n**CVE-2020-10137**  \r\nZ-Wave devices based on Silicon Labs 700 series chipsets using S2 do not adequately authenticate or encrypt FIND_NODE_IN_RANGE frames.\r\n\r\n### Impact\r\nDepending on the chipset and device, an attacker within Z-Wave radio range can deny service, cause devices to crash, deplete batteries, intercept, observe, and replay traffic, and control vulnerable devices.\r\n\r\n### Solution\r\nMitigations for these vulnerabilities vary based on the chipset and device. In some cases it may be necessary to upgrade to newer hardware, for example, 500 and 700 series chipsets that support S2 authentication and encryption.\r\n\r\n### Acknowledgements\r\nThanks to Carlos Kayembe Nkuba, Seulbae Kim, Sven Dietrich, and Heejo Lee for researching and reporting these vulnerabilities.\r\n\r\nThis document was written by Timur Snoke and Art Manion.","clean_desc":null,"impact":null,"resolution":null,"workarounds":null,"sysaffected":null,"thanks":null,"author":null,"public":["https://ieeexplore.ieee.org/document/9663293","https://doi.org/10.1109/ACCESS.2021.3138768","https://github.com/CNK2100/VFuzz-public","https://products.z-wavealliance.org/products/2559","https://z-wavealliance.org/z-wave-oems-developers/"],"cveids":["CVE-2020-10137","CVE-2020-9060","CVE-2020-9057","CVE-2020-9061","CVE-2020-9059","CVE-2020-9058"],"certadvisory":null,"uscerttechnicalalert":null,"datecreated":"2022-01-07T21:54:34.326844Z","publicdate":"2022-01-07T21:54:33.833171Z","datefirstpublished":"2022-01-07T21:54:34.359648Z","dateupdated":"2022-01-09T04:10:25.097709Z","revision":5,"vrda_d1_directreport":null,"vrda_d1_population":null,"vrda_d1_impact":null,"cam_widelyknown":null,"cam_exploitation":null,"cam_internetinfrastructure":null,"cam_population":null,"cam_impact":null,"cam_easeofexploitation":null,"cam_attackeraccessrequired":null,"cam_scorecurrent":null,"cam_scorecurrentwidelyknown":null,"cam_scorecurrentwidelyknownexploited":null,"ipprotocol":null,"cvss_accessvector":null,"cvss_accesscomplexity":null,"cvss_authentication":null,"cvss_confidentialityimpact":null,"cvss_integrityimpact":null,"cvss_availabilityimpact":null,"cvss_exploitablity":null,"cvss_remediationlevel":null,"cvss_reportconfidence":null,"cvss_collateraldamagepotential":null,"cvss_targetdistribution":null,"cvss_securityrequirementscr":null,"cvss_securityrequirementsir":null,"cvss_securityrequirementsar":null,"cvss_basescore":null,"cvss_basevector":null,"cvss_temporalscore":null,"cvss_environmentalscore":null,"cvss_environmentalvector":null,"metric":null,"vulnote":60}