CVE-2023-3110

9.6 CRITICAL

📋 TL;DR

An unauthenticated attacker within Z-Wave range can exploit a stack buffer overflow in SiLabs Unify Gateway versions 1.3.1 and earlier to execute arbitrary code. This affects all systems running vulnerable versions of the Unify Gateway software. The vulnerability requires physical proximity to the target device within Z-Wave wireless range.

💻 Affected Systems

Products:
  • SiLabs Unify Gateway
Versions: 1.3.1 and earlier
Operating Systems: Linux-based embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. Requires Z-Wave radio capability and proximity to target.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to install persistent backdoors, steal sensitive data, or pivot to other network systems.

🟠

Likely Case

Local network compromise leading to gateway device takeover and potential disruption of Z-Wave controlled systems.

🟢

If Mitigated

Limited impact if device is physically secured and network segmented, though code execution remains possible.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires Z-Wave radio equipment and proximity to target device.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.2 or later

Vendor Advisory: https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1

Restart Required: Yes

Instructions:

1. Download latest firmware from Silicon Labs support portal. 2. Backup current configuration. 3. Apply firmware update via web interface or CLI. 4. Reboot device. 5. Verify version is 1.3.2 or higher.

🔧 Temporary Workarounds

Physical Access Control

all

Restrict physical access to Z-Wave range of vulnerable devices

Network Segmentation

all

Isolate Unify Gateway on separate VLAN with strict firewall rules

🧯 If You Can't Patch

  • Physically relocate device to controlled access area
  • Disable Z-Wave radio if not essential for operations

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface or SSH: cat /etc/version

Check Version:

cat /etc/version || unify-gateway --version

Verify Fix Applied:

Confirm version is 1.3.2 or higher and test Z-Wave functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual Z-Wave connection attempts
  • Memory access violations in system logs
  • Unexpected process execution

Network Indicators:

  • Anomalous Z-Wave traffic patterns
  • Unexpected outbound connections from gateway

SIEM Query:

source="unify-gateway" AND (event_type="buffer_overflow" OR severity="critical")

🔗 References

📤 Share & Export