This is a public reference that contains the minimum require information for the vulnerability covered by CVE-2024-50920, CVE-2024-50921, CVE-2024-50924, CVE-2024-50928, CVE-2024-50929, CVE-2024-50930, CVE-2024-50931.
The details for each CVE-2024-***** are provided at the end of this document.
Denial of Service (DoS) vulnerabilities in Z-Wave chipsets. These vulnerabilities may allow a remote, unauthenticated attacker to inject malicious packets to the Z-Wave controller to cause DoS.
Thanks to Carlos Kayembe Nkuba, Jimin Kang, Professor Seunghoon Woo, and Professor Heejo Lee from Korea University for reporting these vulnerabilities.
With the use of tools and transceivers that can decode Z-Wave frame( e.g., Scapy-radio with HackRF One; Yard Stick One; RFCat ; RTL-SDR; Zniffer with Sigma UZB) an attacker sniffs and captures any Z-Wave communication of a target Z-Wave smart home. Then he retrieves the Z-Wave HomeID and NodeID of devices that are transmiting packets in the network. With the knowledge of the HomeID, the attacker can brute force the Z-Wave network to know all remaining available smart devices in the network. This is achieved by sending to all possible Z-Wave node (2 to 232) either these Z-Wave frames: No Operation (NOP), SWITCH_BINARY_GET, or Node Information (NIF), SECURITY_NONCE_GET, SECURITY_2_NONCE_GET to get the acknowledgement (ACK) from devices.
From this ACK the attacker retrieves the node ID of devices that responded and their capabilities.
With the knowledge of the Z-Wave HomeID and NodeID of the device, the attacker crafts a malicious packet with a desired malicious payload and sends it to the target Z-Wave device by using a customized Z-Wave packet management software and hardware such as HackRF One, Yard Stick One, RFCat, or CC1110.
The controller will accept and validate the malicious packet, which cause a DoS. These attacks are critical because they render the Z-Wave controller vulnerable to DoS attacks, which make their service inaccessible to authentic smart home users.
Attacker and target device need to be within a range of 40 to 100 meters. The range can be increased by using an advanced Software-Defined Radio (SDR) hardware.
Denial of service (DoS) on Z-Wave controller.
Silicon Labs ( SiLabs)
Z Wave controllers with Silicon Labs Chipset
Proximate remote attack
Denial of Service on the controller.
By crafting a malicious Z-Wave packet and sending it to the Z-Wave controller and devices.
2023-11-12: Contacting US. CERT/CC
2023-11-13: CERT/CC added 17 vendors to the case
2024-02-15: Silicon Labs (SiLabs) published a Security Advisory A-00000502
It can be accessible after creating a free account at: https://community.silabs.com/s/alert/a45Vm00000000knIAA/a00000502
2024-02-29 : Silicon Labs (SiLabs) published a second Security Advisory A-00000505
It can be accessible after creating a free account at: https://community.silabs.com/s/contentdocument/069Vm000002020u
Check SiLabs Security Advisory A-00000502
It can be accessible after creating a free account at: https://community.silabs.com/s/alert/a45Vm00000000knIAA/a00000502
Check SiLabs Security Advisory A-00000505
It can be accessible after creating a free account at: https://community.silabs.com/s/contentdocument/069Vm000002020u
- https://ccs.korea.ac.kr/pds/Vulnerabilities_in_ZWave.html
- https://github.com/CNK2100/2024-CVE/blob/main/README.md
- Create a free account at https://community.silabs.com to access the response document from the affected vendor, Silicon Labs (SiLabs).
- https://community.silabs.com/068Vm00000211lw
- https://community.silabs.com/s/contentdocument/069Vm000001Gv50
- Experiment videos can be accessed at below two links:
- https://drive.google.com/file/d/1LBycOFbQThFxuGedefVfNqNa0TbTE0R0/view
- https://drive.google.com/file/d/1aZMcGRUVtweYkWlcHzWRsl1jhp1nSBYs/view
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to create a fake node via supplying crafted packets.
Insecure Permissions
Silicon Labs (SiLabs)
Z-Wave Series 700 and 800 devices using Silicon Labs Z-Wave SDK v7.21.1 and earlier - Z-Wave Series 700 and 800 devices using Silicon Labs Z-Wave SDK v7.21.1 and earlier
Z-Wave Series 700 and 800 devices using Silicon Labs Z-Wave SDK v7.21.1 and earlier
Remote
true
true
true
Malformed packets can be sent to add a new fake node in controller memory.
- https://ccs.korea.ac.kr/pds/Vulnerabilities_in_ZWave.html
- https://github.com/CNK2100/2024-CVE/blob/main/README.md
- Create a free account at https://community.silabs.com to access the response document from the affected vendor, Silicon Labs (SiLabs).
- https://community.silabs.com/068Vm00000211lw
- https://community.silabs.com/s/contentdocument/069Vm000001Gv50
- Experiment videos can be accessed at below two links:
- https://drive.google.com/file/d/1LBycOFbQThFxuGedefVfNqNa0TbTE0R0/view
- https://drive.google.com/file/d/1aZMcGRUVtweYkWlcHzWRsl1jhp1nSBYs/view
true
Thanks to Carlos Kayembe Nkuba, Jimin Kang, Professor Seunghoon Woo, and Professor Heejo Lee from Korea University for reporting these vulnerabilities.
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause a Denial of Service (DoS) via repeatedly sending crafted packets to the controller.
Insecure Permissions
Silicon Labs (SiLabs)
Z-Wave Series 700 and 800 devices using Silicon Labs Z-Wave SDK v7.21.1 and earlier - Z-Wave Series 700 and 800 devices using Silicon Labs Z-Wave SDK v7.21.1 and earlier
Z-Wave Series 700 and 800 devices using Silicon Labs Z-Wave SDK v7.21.1 and earlier
Remote
true
true
true
Malformed packets can be sent to keep the controller busy with responding, which denies service to any other tasks that may be occuring. This denial of service can be used to repeatedly jam the controller.
- https://ccs.korea.ac.kr/pds/Vulnerabilities_in_ZWave.html
- https://github.com/CNK2100/2024-CVE/blob/main/README.md
- Create a free account at https://community.silabs.com to access the response document from the affected vendor, Silicon Labs (SiLabs).
- https://community.silabs.com/068Vm00000211lw
- https://community.silabs.com/s/contentdocument/069Vm000001Gv50
- Experiment videos can be accessed at below two links:
- https://drive.google.com/file/d/1LBycOFbQThFxuGedefVfNqNa0TbTE0R0/view
- https://drive.google.com/file/d/1aZMcGRUVtweYkWlcHzWRsl1jhp1nSBYs/view
true
Thanks to Carlos Kayembe Nkuba, Jimin Kang, Professor Seunghoon Woo, and Professor Heejo Lee from Korea University for reporting these vulnerabilities.
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause disrupt communications between the controller and the device itself via repeatedly sending crafted packets to the controller.
Insecure Permissions
Silicon Labs ( SiLabs)
Z-Wave Series 700 and 800 devices using Silicon Labs Z-Wave SDK v7.21.1 and earlier - Z-Wave Series 700 and 800 devices using Silicon Labs Z-Wave SDK v7.21.1 and earlier
Z-Wave Series 700 and 800 devices using Silicon Labs Z-Wave SDK v7.21.1 and earlier
Remote
true
true
true
Malformed packets can be sent to change the end device's role in controller memory, preventing communication with the end device.
- https://ccs.korea.ac.kr/pds/Vulnerabilities_in_ZWave.html
- https://github.com/CNK2100/2024-CVE/blob/main/README.md
- Create a free account at https://community.silabs.com to access the response document from the affected vendor, Silicon Labs (SiLabs).
- https://community.silabs.com/068Vm00000211lw
- https://community.silabs.com/s/contentdocument/069Vm000001Gv50
- Experiment videos can be accessed at below two links:
- https://drive.google.com/file/d/1LBycOFbQThFxuGedefVfNqNa0TbTE0R0/view
- https://drive.google.com/file/d/1aZMcGRUVtweYkWlcHzWRsl1jhp1nSBYs/view
true
Thanks to Carlos Kayembe Nkuba, Jimin Kang, Professor Seunghoon Woo, and Professor Heejo Lee from Korea University for reporting these vulnerabilities.
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to change the wakeup interval of end devices in controller memory, disrupting the device's communications with the controller.
Insecure Permissions
Silicon Labs
Z-Wave Series 700 and 800 devices using Silicon Labs Z-Wave SDK v7.21.1 and earlier - Z-Wave Series 700 and 800 devices using Silicon Labs Z-Wave SDK v7.21.1 and earlier
Remote
true
true
true
Malformed packets can be sent to change the wakeup interval of end devices in controller memory, preventing the controller's periodic communication with the end device. The end device behavior is not impacted by this change.
- https://ccs.korea.ac.kr/pds/Vulnerabilities_in_ZWave.html
- https://github.com/CNK2100/2024-CVE/blob/main/README.md
- Create a free account at https://community.silabs.com to access the response document from the affected vendor, Silicon Labs (SiLabs).
- https://community.silabs.com/068Vm00000211lw
- https://community.silabs.com/s/contentdocument/069Vm000001Gv50
- Experiment videos can be accessed at below two links:
- https://drive.google.com/file/d/1LBycOFbQThFxuGedefVfNqNa0TbTE0R0/view
- https://drive.google.com/file/d/1aZMcGRUVtweYkWlcHzWRsl1jhp1nSBYs/view
true
Thanks to Carlos Kayembe Nkuba, Jimin Kang, Professor Seunghoon Woo, and Professor Heejo Lee from Korea University for reporting these vulnerabilities.
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to arbitrarily change the device type in the controller's memory, leading to a Denial of Service (DoS).
Insecure Permissions
Silicon Labs (SiLabs)
Z-Wave Series 700 and 800 devices using Silicon Labs Z-Wave SDK v7.21.1 and earlier - Z-Wave Series 700 and 800 devices using Silicon Labs Z-Wave SDK v7.21.1 and earlier
Z-Wave Series 700 and 800 devices using Silicon Labs Z-Wave SDK v7.21.1 and earlier
Remote
true
true
true
Malformed packets can be sent to change the device type in controller memory, preventing communication with the end device even though it remains in the network.
- https://ccs.korea.ac.kr/pds/Vulnerabilities_in_ZWave.html
- https://github.com/CNK2100/2024-CVE/blob/main/README.md
- Create a free account at https://community.silabs.com to access the response document from the affected vendor, Silicon Labs (SiLabs).
- https://community.silabs.com/068Vm00000211lw
- https://community.silabs.com/s/contentdocument/069Vm000001Gv50
- Experiment videos can be accessed at below two links:
- https://drive.google.com/file/d/1LBycOFbQThFxuGedefVfNqNa0TbTE0R0/view
- https://drive.google.com/file/d/1aZMcGRUVtweYkWlcHzWRsl1jhp1nSBYs/view
true
Thanks to Carlos Kayembe Nkuba, Jimin Kang, Professor Seunghoon Woo, and Professor Heejo Lee from Korea University for reporting these vulnerabilities.
An issue in Silicon Labs Z-Wave Series 500 v6.84.0 allows attackers to execute arbitrary code.
Insecure Permissions
Silicon Labs
Silicon Labs Z-Wave Series 500 devices running v6.84.0 and earlier of the Silicon Labs Series 500 Z-Wave SDK. - Silicon Labs Z-Wave Series 500 devices running v6.84.0 and earlier of the Silicon Labs Series 500 Z-Wave SDK.
Silicon Labs Z-Wave Series 500 devices running v6.84.0 and earlier of the Silicon Labs Series 500 Z-Wave SDK.
Remote
true
true
Z-Wave controller devices based on Silicon Labs 500 series are susceptible to a denial of service via a crafted malformed NEW NODE REGISTERED Command Class. This can be exploited to add rogue 235 fake devices to the controller memory, preventing the addition of new valid devices.
- Exploited Command Class (CMDCL) = 0x01 0x0D
- https://ccs.korea.ac.kr/pds/Vulnerabilities_in_ZWave.html
- https://github.com/CNK2100/2024-CVE/blob/main/README.md
- Create a free account at https://community.silabs.com to access the response document from the affected vendor, Silicon Labs (SiLabs).
- https://community.silabs.com/068Vm00000211lw
- https://community.silabs.com/s/contentdocument/069Vm000001Gv50
- Experiment videos can be accessed at below two links:
- https://drive.google.com/file/d/1LBycOFbQThFxuGedefVfNqNa0TbTE0R0/view
- https://drive.google.com/file/d/1aZMcGRUVtweYkWlcHzWRsl1jhp1nSBYs/view
true
Thanks to Carlos Kayembe Nkuba, Jimin Kang, Professor Seunghoon Woo, and Professor Heejo Lee from Korea University for reporting these vulnerabilities.
Silicon Labs Z-Wave Series 500 v6.84.0 was discovered to contain insecure permissions.
Insecure Permissions
Silicon Labs
Silicon Labs Z-Wave Series 500 devices running v6.84.0 and earlier of the Silicon Labs Series 500 Z-Wave SDK. - Silicon Labs Z-Wave Series 500 devices running v6.84.0 and earlier of the Silicon Labs Series 500 Z-Wave SDK.
Silicon Labs Z-Wave Series 500 devices running v6.84.0 and earlier of the Silicon Labs Series 500 Z-Wave SDK.
Remote
true
true
Z-Wave controller devices based on Silicon Labs 500 series are susceptible to a denial of service via a crafted malformed FIRMWARE MD GET Command Class. This can be exploited to disrupt the normal network operation during the attack.
- https://ccs.korea.ac.kr/pds/Vulnerabilities_in_ZWave.html
- https://github.com/CNK2100/2024-CVE/blob/main/README.md
- Create a free account at https://community.silabs.com to access the response document from the affected vendor, Silicon Labs (SiLabs).
- https://community.silabs.com/068Vm00000211lw
- https://community.silabs.com/s/contentdocument/069Vm000001Gv50
- Experiment videos can be accessed at below two links:
- https://drive.google.com/file/d/1LBycOFbQThFxuGedefVfNqNa0TbTE0R0/view
- https://drive.google.com/file/d/1aZMcGRUVtweYkWlcHzWRsl1jhp1nSBYs/view
true
Thanks to Carlos Kayembe Nkuba, Jimin Kang, Professor Seunghoon Woo, and Professor Heejo Lee from Korea University for reporting these vulnerabilities.