CVE-2023-0971

9.6 CRITICAL

📋 TL;DR

A logic error in Silicon Labs Z/IP Gateway SDK versions 7.18.02 and earlier allows attackers to bypass authentication, remotely administer Z-Wave controllers, and recover S0/S2 encryption keys. This affects any system using the vulnerable SDK for Z-Wave network management, potentially impacting smart home, industrial, and commercial automation systems.

💻 Affected Systems

Products:
  • Silicon Labs Z/IP Gateway SDK
Versions: 7.18.02 and earlier
Operating Systems: Linux, Embedded systems using the SDK
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any product or system built using the vulnerable SDK version. Z-Wave controllers and gateways from various manufacturers may be impacted.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Z-Wave networks allowing attackers to control all connected devices (lights, locks, sensors), steal encryption keys, and maintain persistent access to the network.

🟠

Likely Case

Unauthorized control of Z-Wave devices, potential physical security bypass (door locks), and surveillance capability through compromised sensors.

🟢

If Mitigated

Limited impact if network segmentation prevents access to Z-Wave controllers and strong authentication mechanisms are in place.

🌐 Internet-Facing: HIGH - If Z/IP Gateway is exposed to the internet, attackers can remotely exploit without authentication.
🏢 Internal Only: MEDIUM - Requires internal network access but exploitation is still possible from compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows authentication bypass, making exploitation straightforward once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.18.03 or later

Vendor Advisory: https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1

Restart Required: Yes

Instructions:

1. Download Z/IP Gateway SDK version 7.18.03 or later from Silicon Labs. 2. Replace the vulnerable SDK with the patched version. 3. Rebuild and redeploy any applications using the SDK. 4. Restart affected Z-Wave controllers and gateways.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Z-Wave controllers and gateways from untrusted networks and the internet

Access Control Lists

linux

Implement strict firewall rules to limit access to Z/IP Gateway services

iptables -A INPUT -p tcp --dport [Z/IP_PORT] -s [TRUSTED_IPS] -j ACCEPT
iptables -A INPUT -p tcp --dport [Z/IP_PORT] -j DROP

🧯 If You Can't Patch

  • Segment Z-Wave network controllers onto isolated VLANs with no internet access
  • Implement network monitoring for unusual Z-Wave controller communication patterns

🔍 How to Verify

Check if Vulnerable:

Check the Z/IP Gateway SDK version. If version is 7.18.02 or earlier, the system is vulnerable.

Check Version:

Check SDK documentation or build configuration files for version information

Verify Fix Applied:

Confirm Z/IP Gateway SDK version is 7.18.03 or later and verify authentication mechanisms are functioning properly.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful administrative actions
  • Unusual Z-Wave controller configuration changes from unexpected sources

Network Indicators:

  • Unauthorized administrative connections to Z/IP Gateway ports
  • Unusual Z-Wave network traffic patterns

SIEM Query:

source="z-wave-controller" AND (event_type="admin_access" OR event_type="key_recovery") AND user="unknown"

🔗 References

📤 Share & Export