Sploit.io - Search

Product: z-wave_software_development_kit, version: >= 7.19.0, < 7.19.3

CVE-2023-51395

Severity: HIGH

Description: The vulnerability described by CVE-2023-0972 has been additionally discovered in Silicon Labs Z-Wave end devices. This vulnerability may allow an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.

CVSS Score: 8.8

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.000610000
  • Percentile: 0.190330000
  • Date: 2026-04-19

ExploitDB

No data available.

HackerOne Data

  • Rank: 9115
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Silicon Labs Z-Wave SDK - Versions: 7.20.0, 7.19.3, 7.18.8, 7.17.5

    References:

    Risk Assessment

    1. Risk Assessment
    CVE-2023-51395 represents a high-risk vulnerability impacting Silicon Labs Z-Wave end devices. The vulnerability, a stack buffer overflow, allows an unauthenticated attacker within Z-Wave range to potentially execute arbitrary code on the affected device. This is a significant concern, as Z-Wave devices are often used in home automation and security systems. The CVSS score of 8.8 (HIGH) reflects the severity, indicating a substantial impact on confidentiality, integrity, and availability. The attack vector is Adjacent Network, meaning the attacker needs to be within Z-Wave range – typically within a home or building. Exploitation is relatively easy (Low Attack Complexity) and doesn’t require user interaction. The business impact can range from disruption of smart home functionality to potential compromise of sensitive data, depending on the role of the Z-Wave device. For instance, a compromised Z-Wave lock could allow unauthorized access, or a compromised sensor could provide false readings impacting security systems. The EPSS score of 0.000610000 suggests a moderate probability of exploitation in a real-world scenario, but the high impact makes it worthwhile to address promptly.

    2. Potential Attack Scenarios
    An attacker within Z-Wave range could leverage this vulnerability to gain control of a Z-Wave enabled smart lock. The attack vector involves sending a specially crafted Z-Wave command to the lock. This command, designed to overflow the stack buffer, overwrites adjacent memory locations with malicious code. Once the malicious code is executed, the attacker can unlock the door remotely, effectively bypassing the lock’s intended security mechanisms. This could be achieved without needing to authenticate to the Z-Wave network, making it a stealthy attack. The attacker could also use this vulnerability to brick the device, causing inconvenience to the user, or use the compromised device as a pivot point to attack other Z-Wave devices within range. Another potential scenario involves a Z-Wave thermostat. A compromised thermostat could be manipulated to significantly raise or lower the temperature, causing discomfort or even damage to a home’s heating/cooling system.

    3. Mitigation Recommendations
    The primary mitigation strategy is to update the Z-Wave SDK to a version unaffected by the vulnerability. Versions 7.20.0, 7.19.3, 7.18.8 and 7.17.5 are currently considered unaffected. Silicon Labs recommends reviewing the Z-Wave firmware of end devices and updating them to the latest version incorporating a patched SDK. Users should check with the manufacturer of their Z-Wave devices for firmware updates. In the interim, consider segmenting the Z-Wave network from other critical networks to limit the potential blast radius of a successful attack. Monitoring Z-Wave network traffic for unusual activity can also help detect potential exploitation attempts. The Silicon Labs community page provides further details and potential updates: https://community.silabs.com/068Vm0000029Xq5. Patching should be prioritized based on the criticality of the Z-Wave device – security-critical devices (locks, security sensors) should be updated first.

    4. Executive Summary
    CVE-2023-51395 is a high-severity vulnerability affecting Silicon Labs Z-Wave devices, potentially allowing attackers to remotely execute code and compromise smart home functionality. This vulnerability could impact the confidentiality, integrity, and availability of Z-Wave devices, potentially leading to unauthorized access, data breaches, or disruption of services. The risk is amplified by the fact that exploitation doesn’t require authentication and is relatively easy to achieve. We recommend updating Z-Wave device firmware to the latest version incorporating a patched Z-Wave SDK as soon as possible, prioritizing security-critical devices like smart locks and security sensors. Addressing this vulnerability is crucial for maintaining the security and reliability of Z-Wave enabled smart home and security systems, protecting both convenience and peace of mind. Prompt action will minimize the risk of a successful attack and its potential business impact.