cve/2013/CVE-2013-20003.md

20 lines
994 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2013-20003](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-20003)
![](https://img.shields.io/static/v1?label=Product&message=Z-Wave&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=S0%3C%20S0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=S0%3D%20S0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm&color=brighgreen)
### Description
Z-Wave devices from Sierra Designs (circa 2013) and Silicon Labs (using S0 security) may use a known, shared network key of all zeros, allowing an attacker within radio range to spoof Z-Wave traffic.
### POC
#### Reference
- https://orangecyberdefense.com/global/blog/sensepost/blackhat-conference-z-wave-security/
- https://sensepost.com/cms/resources/conferences/2013/bh_zwave/Security%20Evaluation%20of%20Z-Wave_WP.pdf
#### Github
No PoCs found on GitHub currently.