Sploit.io - Search

Product: Z/IP Gateway SDK, version: <= 7.18.03

CVE-2024-3051

Severity: HIGH

Description: Malformed Device Reset Locally command classes can be sent to temporarily deny service to an end device. Any frames sent by the end device will not be acknowledged by the gateway during this time.

CVSS Score: 7.5

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.000430000
  • Percentile: 0.110860000
  • Date: 2025-01-09

ExploitDB

No data available.

HackerOne Data

  • Rank: 7450
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • silabs.com Z/IP Gateway SDK - Versions: 0

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability identified as CVE-2024-3051 is a high-severity issue with a CVSS score of 7.5. It affects the Z/IP Gateway SDK, specifically versions of the Gecko SDK up to and including 7.18.03. The vulnerability arises from malformed Device Reset Locally command classes, which can be exploited to temporarily deny service to an end device. This results in a denial of service (DoS) condition where the gateway fails to acknowledge frames sent by the end device.

    The nature of this vulnerability is primarily availability-focused, as it disrupts the normal operation of the device, rendering it temporarily unusable. While there is no impact on confidentiality or integrity, the high availability impact makes this a significant risk for organizations relying on uninterrupted device functionality. The likelihood of exploitation is moderate, given the low attack complexity and the fact that no user interaction or privileges are required. The attack vector is network-based, meaning an attacker can exploit this vulnerability remotely.

    Business impact includes potential downtime for critical systems, loss of productivity, and reputational damage if services are disrupted. Organizations using affected versions of the Z/IP Gateway SDK should prioritize addressing this vulnerability to mitigate these risks.

    2. Potential Attack Scenarios
    An attacker could exploit this vulnerability by crafting and sending malformed Device Reset Locally command classes to a target device over the network. The attack process would involve the following steps:

    - The attacker identifies a vulnerable Z/IP Gateway SDK implementation within a target network.
    - Using a network scanning tool, the attacker locates the IP address of the affected device.
    - The attacker sends specially crafted malformed command classes to the device, triggering the vulnerability.
    - The device enters a state where it cannot process or acknowledge frames sent by the end device, effectively causing a denial of service.

    The potential outcome of this attack is a temporary disruption of service, which could impact critical operations depending on the device's role in the network. For example, if the device is part of an industrial control system, the DoS condition could halt production or monitoring processes, leading to financial losses or safety risks.

    3. Mitigation Recommendations
    To mitigate this vulnerability, organizations should take the following actions:

    - Immediately update the Gecko SDK to a version later than 7.18.03, as this vulnerability is patched in subsequent releases. The latest version can be obtained from the official GitHub repository: https://github.com/SiliconLabs/gecko_sdk/releases.
    - If immediate patching is not feasible, implement network-level controls to restrict access to the affected devices. This can include firewalls or access control lists (ACLs) to limit exposure to untrusted networks.
    - Monitor network traffic for unusual patterns or malformed command classes that could indicate an attempted exploit.
    - Regularly review and apply security updates for all software components, including SDKs and firmware, to reduce the risk of similar vulnerabilities.

    4. Executive Summary
    CVE-2024-3051 is a high-severity vulnerability affecting the Z/IP Gateway SDK, specifically versions of the Gecko SDK up to 7.18.03. It allows attackers to temporarily disrupt service by sending malformed commands, leading to a denial of service condition. While there is no impact on data confidentiality or integrity, the availability impact is significant, potentially causing operational downtime and financial losses.

    The vulnerability is relatively easy to exploit, requiring no user interaction or privileges, and can be executed remotely. Organizations using affected versions of the SDK should prioritize updating to the latest version to mitigate this risk. Immediate actions include patching, implementing network-level controls, and monitoring for suspicious activity. Addressing this vulnerability is critical to maintaining operational continuity and protecting against potential service disruptions.