Z-Wave devices based on Silicon Labs 100, 200, and 300 series chipsets do not support encryption, allowing an attacker within radio range to take control of or cause a denial of service to a vulnerable device. An attacker can also capture and replay Z-Wave traffic. Firmware upgrades cannot directly address this vulnerability as it is an issue with the Z-Wave specification for these legacy chipsets. One way to protect against this vulnerability is to use 500 or 700 series chipsets that support Security 2 (S2) encryption. As examples, the Linear WADWAZ-1 version 3.43 and WAPIRZ-1 version 3.43 (with 300 series chipsets) are vulnerable.
2022-01-10T14:10:16.150
2024-11-21T05:39:55.610
Modified
CVSSv3.1: 8.8 (HIGH)
AV:A/AC:L/Au:N/C:C/I:C/A:C
6.5
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linear | wadwaz-1 | 3.43 | Yes |
Operating System | linear | wapirz-1 | 3.43 | Yes |
Operating System | silabs | 100_series_firmware | * | Yes |
Operating System | silabs | 200_series_firmware | * | Yes |
Operating System | silabs | 300_series_firmware | * | Yes |