CVE-2024-22472

8.1 HIGH

📋 TL;DR

A buffer overflow vulnerability in Silicon Labs 500 Series Z-Wave devices could allow attackers to cause denial of service or potentially execute arbitrary code remotely. This affects all versions of the Silicon Labs 500 Series SDK prior to v6.85.2 running on 500 series Z-Wave devices.

💻 Affected Systems

Products:
  • Silicon Labs 500 Series Z-Wave devices
Versions: All versions prior to v6.85.2
Operating Systems: Embedded systems running Silicon Labs 500 Series SDK
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Z-Wave communication stack implementation in affected devices.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution allowing complete device compromise, network infiltration, and persistent access to Z-Wave networks.

🟠

Likely Case

Denial of service causing device crashes and disruption of Z-Wave network communications.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Buffer overflow vulnerabilities in embedded devices often require specific knowledge of the target architecture and memory layout.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v6.85.2

Vendor Advisory: https://community.silabs.com/068Vm000004rZwm

Restart Required: Yes

Instructions:

1. Download SDK v6.85.2 from Silicon Labs. 2. Recompile device firmware with updated SDK. 3. Deploy updated firmware to affected devices. 4. Restart devices to apply changes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Z-Wave devices on separate network segments to limit attack surface

Access Control

all

Implement strict network access controls to prevent unauthorized access to Z-Wave devices

🧯 If You Can't Patch

  • Segment Z-Wave network from critical infrastructure
  • Monitor for unusual Z-Wave traffic patterns and device behavior

🔍 How to Verify

Check if Vulnerable:

Check device firmware version and SDK version. If SDK version is below 6.85.2, device is vulnerable.

Check Version:

Device-specific command to check firmware version (varies by manufacturer implementation)

Verify Fix Applied:

Confirm device is running firmware compiled with SDK v6.85.2 or later.

📡 Detection & Monitoring

Log Indicators:

  • Device crash logs
  • Unusual Z-Wave protocol errors
  • Memory corruption warnings

Network Indicators:

  • Unusual Z-Wave traffic patterns
  • Malformed Z-Wave packets
  • Excessive retransmissions

SIEM Query:

source="zwave-device" AND (event_type="crash" OR error_code="memory" OR protocol="malformed")

🔗 References

📤 Share & Export