CVE-2024-3051
- EPSS 0.13%
- Published 26.04.2024 22:15:08
- Last modified 21.11.2024 09:28:46
Malformed Device Reset Locally command classes can be sent to temporarily deny service to an end device. Any frames sent by the end device will not be acknowledged by the gateway during this time.
CVE-2024-3052
- EPSS 0.14%
- Published 26.04.2024 22:15:08
- Last modified 27.08.2025 22:15:40
Malformed S2 Nonce Get command classes can be sent to crash the gateway. A hard reset is required to recover the gateway.
CVE-2023-4489
- EPSS 0.69%
- Published 14.12.2023 23:15:07
- Last modified 21.11.2024 08:35:16
The first S0 encryption key is generated with an uninitialized PRNG in Z/IP Gateway products running Silicon Labs Z/IP Gateway SDK v7.18.3 and earlier. This makes the first S0 key generated at startup predictable, potentially allowing network key pre...
CVE-2023-0972
- EPSS 0.04%
- Published 21.06.2023 20:15:10
- Last modified 21.11.2024 07:38:12
Description: A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.
CVE-2023-0969
- EPSS 0.03%
- Published 21.06.2023 20:15:09
- Last modified 21.11.2024 07:38:12
A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an authenticated attacker within Z-Wave range to manipulate an array pointer to disclose the contents of global memory.
CVE-2023-0970
- EPSS 0.03%
- Published 21.06.2023 20:15:09
- Last modified 21.11.2024 07:38:12
Multiple buffer overflow vulnerabilities in SiLabs Z/IP Gateway SDK version 7.18.01 and earlier allow an attacker with invasive physical access to a Z-Wave controller device to overwrite global memory and potentially execute arbitrary code.
CVE-2023-0971
- EPSS 0.01%
- Published 21.06.2023 20:15:09
- Last modified 21.11.2024 07:38:12
A logic error in SiLabs Z/IP Gateway SDK 7.18.02 and earlier allows authentication to be bypassed, remote administration of Z-Wave controllers, and S0/S2 encryption keys to be recovered.