Sploit.io - Search

Product: Z-Wave SDK, version: < 6.85.2

CVE-2024-22472

Severity: HIGH

Description: A buffer Overflow vulnerability in Silicon Labs 500 Series Z-Wave devices may allow Denial of Service, and potential Remote Code execution This issue affects all versions of Silicon LabsĀ 500 Series SDK prior to v6.85.2 running on Silicon Labs 500 series Z-wave devices.

CVSS Score: 8.1

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.000430000
  • Percentile: 0.110070000
  • Date: 2025-01-06

ExploitDB

No data available.

HackerOne Data

  • Rank: 7440
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Silicon Labs Z-Wave SDK - Versions: 0

    References:

    Risk Assessment

    1. Risk Assessment
    The CVE-2024-22472 vulnerability is a high-severity buffer overflow issue affecting Silicon Labs 500 Series Z-Wave devices running SDK versions prior to v6.85.2. This vulnerability allows attackers to potentially execute remote code or cause a denial of service (DoS) by exploiting improperly handled long S0 frames. The CVSS score of 8.1 (HIGH) reflects the significant risk posed by this vulnerability, particularly due to its potential to compromise confidentiality, integrity, and availability.

    The likelihood of exploitation is moderate, given the complexity of the attack (CVSS attack complexity: HIGH). However, the absence of required privileges or user interaction (CVSS privileges required: NONE, user interaction: NONE) increases the risk, especially for devices exposed to untrusted networks. The impact of exploitation is severe, as it could lead to unauthorized access, data manipulation, or complete system disruption. Organizations relying on these devices for critical operations, such as smart home systems or industrial IoT, face significant business continuity risks if this vulnerability is exploited.

    2. Potential Attack Scenarios
    An attacker could exploit this vulnerability by sending specially crafted long S0 frames to a vulnerable Z-Wave device over a network. The attack vector involves leveraging the buffer overflow to overwrite critical memory regions, potentially allowing the execution of arbitrary code. For example, an attacker could target a smart home hub running the affected SDK, sending malicious frames to disrupt the hub's operations or gain control over connected devices.

    The attack process would begin with the attacker identifying a vulnerable device on the network. Using tools to craft and send malicious S0 frames, the attacker could trigger the buffer overflow, causing the device to crash or execute malicious payloads. The potential outcomes include complete device compromise, unauthorized access to sensitive data, or disruption of connected systems, such as lighting, security cameras, or HVAC controls.

    3. Mitigation Recommendations
    The primary mitigation for this vulnerability is to update the affected Z-Wave devices to SDK version 6.85.2 or later, as this version includes the necessary fixes. Organizations should immediately identify and inventory all devices running the vulnerable SDK versions and apply the patch as soon as possible.

    For devices that cannot be immediately updated, consider implementing network segmentation to isolate Z-Wave devices from untrusted networks. Additionally, monitor network traffic for unusual patterns, such as excessive S0 frames, which could indicate an attempted exploit. Regularly review and apply security updates from Silicon Labs to ensure devices remain protected against known vulnerabilities.

    Relevant resources for patching and additional guidance can be found at the following links:
    - Silicon Labs Community: https://community.silabs.com/068Vm000004rZwm
    - PacketStorm Security: https://packetstormsecurity.com/search/?q=CVE-2024-22472

    4. Executive Summary
    CVE-2024-22472 is a high-severity buffer overflow vulnerability affecting Silicon Labs 500 Series Z-Wave devices. This vulnerability could allow attackers to execute remote code or cause denial of service, posing significant risks to confidentiality, integrity, and availability. Exploitation could lead to unauthorized access, data manipulation, or disruption of critical systems, particularly in smart home or industrial IoT environments.

    The risk is heightened by the ease of network-based exploitation and the lack of required privileges or user interaction. Immediate action is required to mitigate this vulnerability, including applying the latest SDK update (v6.85.2 or later) and isolating vulnerable devices from untrusted networks. Failure to address this issue could result in severe operational and financial impacts, making it a top priority for organizations using affected Z-Wave devices.