8.3

CVE-2013-20003

Exploit

Z-Wave devices from Sierra Designs (circa 2013) and Silicon Labs (using S0 security) may use a known, shared network key of all zeros, allowing an attacker within radio range to spoof Z-Wave traffic.

Data is provided by the National Vulnerability Database (NVD)
SilabsZgm130s037hgn Firmware Versions2
   SilabsZgm130s037hgn Version-
SilabsZm5202 Firmware Versions2
   SilabsZm5202 Version-
SilabsZm5101 Firmware Versions2
   SilabsZm5101 Version-
SilabsZgm2305a27hgn Firmware Versions2
   SilabsZgm2305a27hgn Version-
SilabsZgm230sb27hgn Firmware Versions2
   SilabsZgm230sb27hgn Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.14% 0.307
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.3 1.6 6
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
nvd@nist.gov 7.9 5.5 10
AV:A/AC:M/Au:N/C:C/I:C/A:C
CWE-327 Use of a Broken or Risky Cryptographic Algorithm

The product uses a broken or risky cryptographic algorithm or protocol.

CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.