CVE-2013-20003
📋 TL;DR
This vulnerability affects Z-Wave devices from Sierra Designs (circa 2013) and Silicon Labs using S0 security that use a known, shared network key of all zeros. Attackers within radio range can spoof Z-Wave traffic to control devices or intercept communications. This impacts home automation and IoT systems using vulnerable Z-Wave implementations.
💻 Affected Systems
- Sierra Designs Z-Wave devices
- Silicon Labs Z-Wave devices with S0 security
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of Z-Wave network allowing attacker to control all connected devices (locks, lights, alarms), intercept sensitive data, or create denial of service conditions.
Likely Case
Unauthorized control of individual Z-Wave devices, privacy invasion through traffic monitoring, or device manipulation within radio range.
If Mitigated
Limited impact if devices are physically secured or network uses S2 security, though downgrade attacks may still be possible.
🎯 Exploit Status
Requires specialized Z-Wave radio hardware and proximity to target devices. Attack tools like Z-Shave have been demonstrated at security conferences.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: N/A
Restart Required: No
Instructions:
No official patch exists for affected devices. Replace vulnerable devices with S2 security-capable hardware or implement network segmentation.
🔧 Temporary Workarounds
Upgrade to S2 Security
allReplace vulnerable S0 security devices with S2 security-capable hardware
Network Segmentation
allIsolate Z-Wave network from critical systems and use separate controller
🧯 If You Can't Patch
- Physically secure Z-Wave devices to limit radio range exposure
- Monitor for unauthorized Z-Wave device additions to network
🔍 How to Verify
Check if Vulnerable:
Check device manufacturer and model year (2013 or earlier). Use Z-Wave controller software to check if S0 security is enabled with default network key.
Check Version:
N/A (check via Z-Wave controller interface or device documentation)
Verify Fix Applied:
Verify devices support S2 security and have unique network keys configured. Check controller shows S2 security active.
📡 Detection & Monitoring
Log Indicators:
- Unexpected Z-Wave device additions
- Multiple failed security inclusion attempts
- S0 security downgrade attempts
Network Indicators:
- Unusual Z-Wave traffic patterns
- Spoofed device commands
- Traffic using default network key
SIEM Query:
N/A (Z-Wave uses proprietary radio protocol, not IP-based)
🔗 References
- https://orangecyberdefense.com/global/blog/sensepost/blackhat-conference-z-wave-security/
- https://sensepost.com/cms/resources/conferences/2013/bh_zwave/Security%20Evaluation%20of%20Z-Wave_WP.pdf
- https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/
- https://orangecyberdefense.com/global/blog/sensepost/blackhat-conference-z-wave-security/
- https://sensepost.com/cms/resources/conferences/2013/bh_zwave/Security%20Evaluation%20of%20Z-Wave_WP.pdf
- https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/