Command Authentication Bypass in Z/IP Gateway
CVE-2023-0971

9.6CRITICAL

Key Information:

Vendor
CVE Published:
21 June 2023

What is CVE-2023-0971?

A logic error in SiLabs Z/IP Gateway SDK versions 7.18.02 and earlier enables an attacker to bypass authentication mechanisms. This vulnerability allows for unauthorized remote administration of Z-Wave controllers and exposes sensitive S0/S2 encryption keys. If exploited, it poses significant risks to the security of devices utilizing Z-Wave communications, threatening the integrity and confidentiality of managed systems. Immediate actions are recommended to mitigate potential exploitation of this vulnerability.

Affected Version(s)

Z/IP Gateway 7.18.03

References

CVSS V3.1

Score:
9.6
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.