Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Zm5101_firmware
(Silabs)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-05-17 | CVE-2022-24611 | Denial of Service (DoS) in the Z-Wave S0 NonceGet protocol specification in Silicon Labs Z-Wave 500 series allows local attackers to block S0/S2 protected Z-Wave network via crafted S0 NonceGet Z-Wave packages, utilizing included but absent NodeIDs. | Sd3502_firmware, Sd3503_firmware, Zm5101_firmware, Zm5202_firmware, Zm5304_firmware | 6.5 | ||
2022-02-04 | CVE-2013-20003 | Z-Wave devices from Sierra Designs (circa 2013) and Silicon Labs (using S0 security) may use a known, shared network key of all zeros, allowing an attacker within radio range to spoof Z-Wave traffic. | Zgm130s037hgn_firmware, Zgm2305a27hgn_firmware, Zgm230sb27hgn_firmware, Zm5101_firmware, Zm5202_firmware | 8.3 | ||
2022-02-04 | CVE-2018-25029 | The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic. | Zgm130s037hgn_firmware, Zgm2305a27hgn_firmware, Zgm230sb27hgn_firmware, Zm5101_firmware, Zm5202_firmware | 8.1 |