Silabs

Emberznet

8 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Published 15.01.2025 08:15:26
  • Last modified 16.09.2025 17:15:40

A ZigBee coordinator, router, or end device may change their node ID when an unsolicited encrypted rejoin response is received, this change in node ID causes Denial of Service (DoS). To recover from this DoS, the network must be re-established

  • EPSS 0.11%
  • Published 09.01.2025 15:15:12
  • Last modified 09.01.2025 15:15:12

A buffer overflow vulnerability in the packet handoff plugin allows an attacker to overwrite memory outside the plugin's buffer.

  • EPSS 0.05%
  • Published 23.02.2024 20:15:51
  • Last modified 12.02.2025 18:49:22

Due to an allocation of resources without limits, an uncontrolled resource consumption vulnerability exists in Silicon Labs Ember ZNet SDK prior to v7.4.0.0 (delivered as part of Silicon Labs Gecko SDK v4.4.0) which may enable attackers to trigger a ...

  • EPSS 0.05%
  • Published 23.02.2024 20:15:51
  • Last modified 12.02.2025 18:49:15

High traffic environments may result in NULL Pointer Dereference vulnerability in Silicon Labs's Ember ZNet SDK before v7.4.0, causing a system crash.

  • EPSS 0.03%
  • Published 23.02.2024 17:15:07
  • Last modified 12.02.2025 18:49:30

Ember ZNet between v7.2.0 and v7.4.0 used software AES-CCM instead of integrated hardware cryptographic accelerators, potentially increasing risk of electromagnetic and differential power analysis sidechannel attacks.

  • EPSS 0.08%
  • Published 04.10.2023 21:15:09
  • Last modified 21.11.2024 08:20:33

TouchLink packets processed after timeout or out of range due to Operation on a Resource after Expiration and Missing Release of Resource after Effective Lifetime may allow a device to be added outside of valid TouchLink range or pairing duration Th...

  • EPSS 0.26%
  • Published 14.11.2022 18:15:16
  • Last modified 21.11.2024 06:51:25

Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Silicon Labs Ember ZNet allows Overflow Buffers.

  • EPSS 0.33%
  • Published 14.11.2022 18:15:16
  • Last modified 21.11.2024 06:51:25

A malformed packet causes a stack overflow in the Ember ZNet stack. This causes an assert which leads to a reset, immediately clearing the error.