CVE-2024-3051

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to send malformed Device Reset Locally command classes to temporarily deny service to end devices. When exploited, the gateway stops acknowledging frames from affected devices, causing service disruption. This affects systems using vulnerable Silicon Labs Z-Wave implementations.

💻 Affected Systems

Products:
  • Silicon Labs Z-Wave SDK implementations
  • Devices using Z-Wave 700/800 series chips
Versions: Specific versions not detailed in advisory; likely affects multiple Z-Wave SDK versions
Operating Systems: Embedded systems running Z-Wave stack
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Z-Wave gateways and controllers that process Device Reset Locally commands. End devices may be impacted depending on gateway implementation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Prolonged denial of service affecting critical IoT devices like security sensors, medical devices, or industrial controls, potentially leading to safety risks or system failures.

🟠

Likely Case

Temporary service disruption of smart home or building automation devices, causing inconvenience but typically no permanent damage.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring; affected devices recover after attack stops.

🌐 Internet-Facing: MEDIUM - Attackers could target exposed Z-Wave gateways, but requires specific protocol knowledge and access.
🏢 Internal Only: MEDIUM - Insider threats or compromised internal systems could exploit this to disrupt IoT operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending malformed Z-Wave frames but doesn't require authentication. Requires knowledge of Z-Wave protocol and physical/network access to the Z-Wave network.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory; check vendor updates

Vendor Advisory: https://community.silabs.com/068Vm0000045w2j

Restart Required: Yes

Instructions:

1. Check Silicon Labs advisory for specific patch versions. 2. Update Z-Wave SDK or gateway firmware to patched version. 3. Restart affected devices and controllers. 4. Verify normal operation post-update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Z-Wave network from untrusted networks to prevent remote exploitation

Disable Unnecessary Features

all

Disable Device Reset Locally command processing if not required

🧯 If You Can't Patch

  • Implement network monitoring for abnormal Z-Wave traffic patterns
  • Segment Z-Wave controllers on isolated VLANs with strict access controls

🔍 How to Verify

Check if Vulnerable:

Check if your Z-Wave gateway/controller uses Silicon Labs Z-Wave SDK and hasn't been updated per the advisory

Check Version:

Vendor-specific commands; typically through gateway admin interface or manufacturer tools

Verify Fix Applied:

Test Device Reset Locally command functionality after patch; ensure normal acknowledgment behavior

📡 Detection & Monitoring

Log Indicators:

  • Unusual Device Reset Locally command frequency
  • Gateway log entries showing malformed command processing
  • Increased device disconnection events

Network Indicators:

  • Abnormal Z-Wave frame patterns
  • Repeated malformed command transmissions
  • Unacknowledged device frames

SIEM Query:

source="zwave_gateway" AND (command="DeviceResetLocally" OR error="malformed")

🔗 References

📤 Share & Export