Z-Wave devices based on Silicon Labs 100, 200, and 300 series chipsets do not support encryption, allowing an attacker within radio range to take control of or cause a denial of service to a vulnerable device. An attacker can also capture and replay Z-Wave traffic. Firmware upgrades cannot directly address this vulnerability as it is an issue with the Z-Wave specification for these legacy chipsets. One way to protect against this vulnerability is to use 500 or 700 series chipsets that support Security 2 (S2) encryption. As examples, the Linear WADWAZ-1 version 3.43 and WAPIRZ-1 version 3.43 (with 300 series chipsets) are vulnerable.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published: 2022-01-07T04:30:23.469790Z

Updated: 2024-09-16T20:03:41.584Z

Reserved: 2020-02-18T00:00:00

Link: CVE-2020-9057

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2022-01-10T14:10:16.150

Modified: 2022-01-18T17:10:27.780

Link: CVE-2020-9057

cve-icon Redhat

No data.