CVE-2021-27289

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers within wireless range to replay captured Zigbee packets with manipulated sequence numbers, bypassing anti-replay protection. Attackers can inject spoofed commands to trigger false alerts and manipulate smart home device behavior. Users of Ksix Zigbee smart home kits with specific firmware versions are affected.

💻 Affected Systems

Products:
  • Ksix Zigbee Gateway Module
  • Ksix Zigbee Door Sensor
  • Ksix Zigbee Motion Sensor
Versions: Zigbee Gateway Module v1.0.3, Door Sensor v1.0.7, Motion Sensor v1.0.12
Default Config Vulnerable: ⚠️ Yes
Notes: All devices using these firmware versions are vulnerable out-of-the-box. The vulnerability is in the Zigbee protocol implementation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains complete control over smart home devices, triggering false security alerts, disabling legitimate alarms, or creating dangerous conditions by manipulating sensors.

🟠

Likely Case

False alerts and notifications in the mobile app, misleading users about security status, and potential denial of service for legitimate sensor functions.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though false alerts may still occur.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical proximity to capture packets. Multiple public proof-of-concept tools and videos demonstrate the attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Contact Ksix support for firmware updates if they become available.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Zigbee network from other networks to limit attack surface

Physical Security

all

Restrict physical access to wireless range of devices

🧯 If You Can't Patch

  • Replace affected devices with models from vendors that implement proper Zigbee security
  • Disable affected devices and use alternative security monitoring solutions

🔍 How to Verify

Check if Vulnerable:

Check device firmware versions via mobile app or device labeling. Gateway Module v1.0.3, Door Sensor v1.0.7, Motion Sensor v1.0.12 are vulnerable.

Check Version:

Check via Ksix mobile application or physical device labeling

Verify Fix Applied:

Verify firmware has been updated to versions not listed as vulnerable. No known fixed versions available.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected sensor activations
  • Multiple identical alerts in rapid succession
  • Alerts from sensors that should be inactive

Network Indicators:

  • Unusual Zigbee packet patterns
  • Repeated identical frames with different sequence numbers
  • Packets with abnormally high frame counters

SIEM Query:

Zigbee traffic analysis showing frame counter anomalies or replay patterns

🔗 References

📤 Share & Export