183 lines
5.4 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2020-9060",
"sourceIdentifier": "cret@cert.org",
"published": "2022-01-10T14:10:16.380",
"lastModified": "2022-09-20T17:16:46.377",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Z-Wave devices based on Silicon Labs 500 series chipsets using S2, including but likely not limited to the ZooZ ZST10 version 6.04, ZooZ ZEN20 version 5.03, ZooZ ZEN25 version 5.03, Aeon Labs ZW090-A version 3.95, and Fibaro FGWPB-111 version 4.3, are susceptible to denial of service and resource exhaustion via malformed SECURITY NONCE GET, SECURITY NONCE GET 2, NO OPERATION, or NIF REQUEST messages."
},
{
"lang": "es",
"value": "Los dispositivos Z-Wave basados en los conjuntos de chips de la serie 500 de Silicon Labs que usan S2, incluidos, entre otros, ZooZ ZST10 versi\u00f3n 6.04, ZooZ ZEN20 versi\u00f3n 5.03, ZooZ ZEN25 versi\u00f3n 5.03, Aeon Labs ZW090-A versi\u00f3n 3. 95, y Fibaro FGWPB-111 versi\u00f3n 4.3, son susceptibles a una denegaci\u00f3n de servicio y al agotamiento de recursos por medio de mensajes malformados SECURITY NONCE GET, SECURITY NONCE GET 2, NO OPERATION, o NIF REQUEST"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.5,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
},
{
"source": "cret@cert.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-346"
},
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:silabs:500_series_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92760285-A1DD-4569-AD71-834BBF2D9E64"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:aeotec:zw090-a:3.95:*:*:*:*:*:*:*",
"matchCriteriaId": "5B58B8CF-11BD-402E-8625-4C78629F181E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fibaro:fgwpb-111:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D1E765-5656-46A2-BA3E-02A6AD1C0D53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zooz:zen20:5.03:*:*:*:*:*:*:*",
"matchCriteriaId": "41C64AB8-9EBB-4C66-9210-643687820B44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zooz:zen25:5.03:*:*:*:*:*:*:*",
"matchCriteriaId": "5BA9AB45-0DE1-40CD-961C-4ADB8B506B45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zooz:zst10:6.04:*:*:*:*:*:*:*",
"matchCriteriaId": "7DB7F120-CB63-46F6-AC91-8C64BC5D57BC"
}
]
}
]
}
],
"references": [
{
"url": "https://doi.org/10.1109/ACCESS.2021.3138768",
"source": "cret@cert.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/CNK2100/VFuzz-public",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://ieeexplore.ieee.org/document/9663293",
"source": "cret@cert.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://kb.cert.org/vuls/id/142629",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.kb.cert.org/vuls/id/142629",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}