Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-25029


The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic.


Published

2022-02-04T23:15:09.730

Last Modified

2024-11-21T04:03:23.580

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.1 (HIGH)

CVSSv2 Vector

AV:A/AC:L/Au:N/C:P/I:P/A:N

  • Access Vector: ADJACENT_NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

6.5

Impact Score

4.9

Weaknesses
  • Type: Secondary
    CWE-757
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System silabs zgm130s037hgn_firmware s2 Yes
Hardware silabs zgm130s037hgn - No
Operating System silabs zm5202_firmware s2 Yes
Hardware silabs zm5202 - No
Operating System silabs zm5101_firmware s2 Yes
Hardware silabs zm5101 - No
Operating System silabs zgm2305a27hgn_firmware s2 Yes
Hardware silabs zgm2305a27hgn - No
Operating System silabs zgm230sb27hgn_firmware s2 Yes
Hardware silabs zgm230sb27hgn - No

References