CVE-2024-50930

8.8 HIGH

📋 TL;DR

This vulnerability in Silicon Labs Z-Wave Series 500 firmware allows attackers to execute arbitrary code on affected devices. It affects Z-Wave Series 500 devices running firmware version 6.84.0. Attackers could potentially take full control of vulnerable smart home and IoT devices.

💻 Affected Systems

Products:
  • Silicon Labs Z-Wave Series 500
Versions: v6.84.0
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Z-Wave Series 500 chips used in various smart home/IoT devices from multiple manufacturers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing attackers to install persistent malware, pivot to other network devices, or create botnets from compromised IoT devices.

🟠

Likely Case

Remote code execution leading to device compromise, data exfiltration, or disruption of smart home automation functions.

🟢

If Mitigated

Limited impact if devices are isolated from internet and internal networks with strict access controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Proof of concept available in GitHub repository. Exploitation likely requires network access to vulnerable devices.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with device manufacturers for updated firmware

Vendor Advisory: https://www.silabs.com/security

Restart Required: Yes

Instructions:

1. Contact device manufacturer for firmware updates. 2. Apply firmware update following manufacturer instructions. 3. Reboot device after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Z-Wave devices on separate VLAN with strict firewall rules

Disable Remote Access

all

Disable cloud/remote management features if not required

🧯 If You Can't Patch

  • Segment Z-Wave network from critical systems
  • Implement strict network monitoring for unusual Z-Wave traffic

🔍 How to Verify

Check if Vulnerable:

Check device firmware version through manufacturer's management interface or mobile app

Check Version:

Manufacturer-specific command varies by device

Verify Fix Applied:

Verify firmware version has been updated beyond v6.84.0

📡 Detection & Monitoring

Log Indicators:

  • Unusual firmware update attempts
  • Multiple failed authentication attempts on Z-Wave interface

Network Indicators:

  • Unusual Z-Wave protocol traffic patterns
  • Unexpected outbound connections from Z-Wave devices

SIEM Query:

source="zwave" AND (event_type="firmware_update" OR auth_failure>5)

🔗 References

📤 Share & Export