FKIE_CVE-2024-50920
Vulnerability from fkie_nvd - Published: 2024-12-10 19:15 - Updated: 2025-07-01 15:28
Severity ?
Summary
Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to create a fake node via supplying crafted packets.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/CNK2100/2024-CVE/blob/main/README.md | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:silabs:z-wave_software_development_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3939A08E-08C2-46E4-A78E-0D8DC840F414",
"versionEndIncluding": "7.21.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:silabs:efr32zg14p231f256gm32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2DFB610-ABC0-4BF9-AB1B-EBE6919306A1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A25C5C4-EC69-4A14-9DBC-43CF3575D42A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a010f512gm48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE85974A-943D-4F65-83C7-2F348EFB8D73",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E572162D-C2AF-4859-BA1F-44312C441964",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23a020f512gm48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53BC1B3E-F501-48D4-8677-9DA3E0FAA1DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6FF1AE-BD40-42F4-BFA6-3EAB981B53A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b010f512im48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80565B28-70B9-4085-AA23-9FFAA32847A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b011f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF915B76-59C2-48E3-A718-95D8EBF30DC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF75E38-325F-4E8F-AA55-5D68C1C81B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b020f512im48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13584AB6-3E8C-417C-A713-AD2BC826C1DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:efr32zg23b021f512im40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D96B8612-8818-40B4-BB02-3E29C5A8EBFF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm130s037hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57708CEA-8CF3-4FAF-A7D4-8572EE7A7E53",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm230sa27hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93C8AAF3-390E-4755-BEB3-789AECE5A04E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:silabs:zgm230sb27hgn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5794CE0B-4A2F-439F-A6DF-42A710E35D89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to create a fake node via supplying crafted packets."
},
{
"lang": "es",
"value": "Los permisos inseguros en Silicon Labs (SiLabs) Z-Wave Series 700 y 800 v7.21.1 permiten a los atacantes crear un nodo falso mediante el suministro de paquetes manipulados."
}
],
"id": "CVE-2024-50920",
"lastModified": "2025-07-01T15:28:22.123",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-12-10T19:15:30.290",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-281"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…