Sploit.io - Search

Product: Z/IP Gateway SDK, version: <= 7.18.3

CVE-2023-4489

Severity: MEDIUM

Description: The first S0 encryption key is generated with an uninitialized PRNG in Z/IP Gateway products running Silicon Labs Z/IP Gateway SDK v7.18.3 and earlier. This makes the first S0 key generated at startup predictable, potentially allowing network key prediction and unauthorized S0 network access.

CVSS Score: 6.4

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.006920000
  • Percentile: 0.718810000
  • Date: 2026-04-27

ExploitDB

No data available.

HackerOne Data

  • Rank: 3196
  • Reports submitted count: 1
  • Unknown: 1
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • silabs.com Z/IP Gateway SDK - Versions: 0

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability CVE-2023-4489 centers on the predictable generation of the first S0 encryption key in Silicon Labs Z/IP Gateway products using SDK v7.18.3 and earlier, due to an uninitialized Pseudo-Random Number Generator (PRNG). This represents a medium risk, with a CVSS score of 6.4. The nature of the vulnerability is cryptographic weakness, specifically a predictable key. The business impact could be significant, especially for organizations relying heavily on secure wireless communication through these gateways. The likelihood of exploitation is moderate, requiring physical access to the gateway, but the attack complexity is high as it involves predicting the key. A successful attack could compromise the confidentiality, integrity, and availability of the network utilizing the affected Z/IP Gateway. Confidentiality is impacted because attackers can decrypt network traffic. Integrity is impacted as attackers can potentially inject malicious traffic. Availability can be impacted if the attacker can disrupt the network through key manipulation. The EPSS score of 0.006920000 suggests a relatively low but present probability of exploitation in the wild.

    2. Potential Attack Scenarios
    An attacker with physical access to the Z/IP Gateway can exploit this vulnerability. The attack scenario unfolds as follows: an attacker gains physical access to the Z/IP Gateway. Upon startup, the gateway generates the first S0 encryption key using the uninitialized PRNG. The attacker captures the initial network traffic to observe the key exchange. Because the PRNG is not properly seeded, the initial S0 key is predictable, potentially allowing the attacker to determine the key through relatively simple analysis. Once the key is known, the attacker can decrypt the network traffic, potentially intercepting sensitive data, and can also inject malicious traffic that appears to be legitimately encrypted. This could allow the attacker to monitor communications, disrupt operations, or even gain control of devices connected through the gateway.

    3. Mitigation Recommendations
    The primary mitigation is to update the Silicon Labs Z/IP Gateway SDK to a version later than v7.18.3. Silicon Labs has provided a vendor advisory detailing the update process and can be found at: https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000buWj0QAE?operationContext=S1. For immediate action, if patching cannot occur right away, consider limiting physical access to the Z/IP Gateways to reduce the attack surface. Regularly monitor network traffic for anomalous activity that could indicate a compromised key. Review the GitHub repository for the gecko_sdk (https://github.com/SiliconLabs/gecko_sdk) for the latest updates and security patches. Implement strong network segmentation to limit the blast radius if a breach does occur.

    4. Executive Summary
    CVE-2023-4489 affects Silicon Labs Z/IP Gateways using SDK v7.18.3 and earlier. The vulnerability stems from a predictable encryption key generated upon startup due to an uninitialized random number generator. This allows an attacker with physical access to potentially intercept and manipulate network traffic, impacting the confidentiality, integrity, and availability of the network. The risk is considered medium, but the potential business impact is significant, especially for organizations relying on secure wireless communications. We recommend updating the Z/IP Gateway SDK to the latest version as soon as possible to mitigate this vulnerability. Prioritizing this update will strengthen network security and protect sensitive data from potential compromise. Failure to address this vulnerability could lead to data breaches, network disruptions, and potentially compromise the trust of customers and partners.