CVE-2024-22472
📋 TL;DR
A buffer overflow vulnerability in Silicon Labs 500 Series Z-Wave devices could allow attackers to cause denial of service or potentially execute arbitrary code remotely. This affects all versions of the Silicon Labs 500 Series SDK prior to v6.85.2 running on 500 series Z-Wave devices.
💻 Affected Systems
- Silicon Labs 500 Series Z-Wave devices
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution allowing complete device compromise, network infiltration, and persistent access to Z-Wave networks.
Likely Case
Denial of service causing device crashes and disruption of Z-Wave network communications.
If Mitigated
Limited impact with proper network segmentation and access controls preventing exploitation attempts.
🎯 Exploit Status
Buffer overflow vulnerabilities in embedded devices often require specific knowledge of the target architecture and memory layout.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v6.85.2
Vendor Advisory: https://community.silabs.com/068Vm000004rZwm
Restart Required: Yes
Instructions:
1. Download SDK v6.85.2 from Silicon Labs. 2. Recompile device firmware with updated SDK. 3. Deploy updated firmware to affected devices. 4. Restart devices to apply changes.
🔧 Temporary Workarounds
Network Segmentation
allIsolate Z-Wave devices on separate network segments to limit attack surface
Access Control
allImplement strict network access controls to prevent unauthorized access to Z-Wave devices
🧯 If You Can't Patch
- Segment Z-Wave network from critical infrastructure
- Monitor for unusual Z-Wave traffic patterns and device behavior
🔍 How to Verify
Check if Vulnerable:
Check device firmware version and SDK version. If SDK version is below 6.85.2, device is vulnerable.
Check Version:
Device-specific command to check firmware version (varies by manufacturer implementation)
Verify Fix Applied:
Confirm device is running firmware compiled with SDK v6.85.2 or later.
📡 Detection & Monitoring
Log Indicators:
- Device crash logs
- Unusual Z-Wave protocol errors
- Memory corruption warnings
Network Indicators:
- Unusual Z-Wave traffic patterns
- Malformed Z-Wave packets
- Excessive retransmissions
SIEM Query:
source="zwave-device" AND (event_type="crash" OR error_code="memory" OR protocol="malformed")