{ "schema_version": "1.4.0", "id": "GHSA-pwj3-5896-6xh2", "modified": "2022-01-19T00:02:00Z", "published": "2022-01-11T00:01:42Z", "aliases": [ "CVE-2020-9057" ], "details": "Z-Wave devices based on Silicon Labs 100, 200, and 300 series chipsets do not support encryption, allowing an attacker within radio range to take control of or cause a denial of service to a vulnerable device. An attacker can also capture and replay Z-Wave traffic. Firmware upgrades cannot directly address this vulnerability as it is an issue with the Z-Wave specification for these legacy chipsets. One way to protect against this vulnerability is to use 500 or 700 series chipsets that support Security 2 (S2) encryption. As examples, the Linear WADWAZ-1 version 3.43 and WAPIRZ-1 version 3.43 (with 300 series chipsets) are vulnerable.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9057" }, { "type": "WEB", "url": "https://doi.org/10.1109/ACCESS.2021.3138768" }, { "type": "WEB", "url": "https://github.com/CNK2100/VFuzz-public" }, { "type": "WEB", "url": "https://ieeexplore.ieee.org/document/9663293" }, { "type": "WEB", "url": "https://kb.cert.org/vuls/id/142629" }, { "type": "WEB", "url": "https://www.kb.cert.org/vuls/id/142629" } ], "database_specific": { "cwe_ids": [ "CWE-311" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-01-10T14:10:00Z" } }