CVE-2020-9057

CVSS V2 High 8.3 CVSS V3 High 8.8
Description
Z-Wave devices based on Silicon Labs 100, 200, and 300 series chipsets do not support encryption, allowing an attacker within radio range to take control of or cause a denial of service to a vulnerable device. An attacker can also capture and replay Z-Wave traffic. Firmware upgrades cannot directly address this vulnerability as it is an issue with the Z-Wave specification for these legacy chipsets. One way to protect against this vulnerability is to use 500 or 700 series chipsets that support Security 2 (S2) encryption. As examples, the Linear WADWAZ-1 version 3.43 and WAPIRZ-1 version 3.43 (with 300 series chipsets) are vulnerable.
Overview
  • CVE ID
  • CVE-2020-9057
  • Assigner
  • cret@cert.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-01-10T14:10:16
  • Last Modified Date
  • 2022-01-18T17:10:27
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:linear:wadwaz-1:3.43:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:linear:wapirz-1:3.43:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:silabs:100_series_firmware:*:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:silabs:200_series_firmware:*:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:silabs:300_series_firmware:*:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:A/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • ADJACENT_NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 8.3
  • Severity
  • HIGH
  • Exploitability Score
  • 6.5
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • ADJACENT_NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 8.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.8
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://github.com/CNK2100/VFuzz-public Third Party Advisory
https://kb.cert.org/vuls/id/142629 Third Party Advisory US Government Resource
https://ieeexplore.ieee.org/document/9663293 Broken Link
https://doi.org/10.1109/ACCESS.2021.3138768 Broken Link
https://www.kb.cert.org/vuls/id/142629 Third Party Advisory US Government Resource
History
Created Old Value New Value Data Type Notes
2022-05-10 06:37:12 Added to TrackCVE
2022-12-06 05:50:31 cert@cert.org cret@cert.org CVE Assigner updated
2022-12-06 05:50:31 2022-01-10T14:10Z 2022-01-10T14:10:16 CVE Published Date updated
2022-12-06 05:50:31 2022-01-18T17:10:27 CVE Modified Date updated
2022-12-06 05:50:31 Analyzed Vulnerability Status updated