CVE-2024-7322

5.8 MEDIUM

📋 TL;DR

This vulnerability allows an attacker to send a malicious encrypted rejoin response to ZigBee devices, causing them to change their node ID and resulting in network denial of service. The affected devices include ZigBee coordinators, routers, and end devices. Recovery requires re-establishing the entire network.

💻 Affected Systems

Products:
  • Silicon Labs ZigBee devices with affected firmware
Versions: Specific versions not detailed in reference; check vendor advisory
Operating Systems: Embedded systems running ZigBee stack
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices operating as ZigBee coordinators, routers, or end devices when using encrypted rejoin functionality

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of ZigBee network operations requiring full network reconfiguration and downtime for all connected devices.

🟠

Likely Case

Targeted DoS attacks against specific ZigBee networks causing temporary service disruption until network is manually re-established.

🟢

If Mitigated

Limited impact if network segmentation and monitoring are in place to detect anomalous rejoin attempts.

🌐 Internet-Facing: LOW (ZigBee networks typically operate on local wireless frequencies and are not directly internet-accessible)
🏢 Internal Only: MEDIUM (Attack requires proximity to wireless network but can be executed from within range)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires ability to send crafted ZigBee packets within wireless range; encryption knowledge needed for rejoin response

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Silicon Labs advisory for specific fixed versions

Vendor Advisory: https://community.silabs.com/068Vm00000I7ri2

Restart Required: Yes

Instructions:

1. Check Silicon Labs advisory for affected products. 2. Download and apply firmware updates from vendor. 3. Restart affected ZigBee devices. 4. Re-establish network if previously disrupted.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ZigBee networks from potential attackers using physical separation and RF shielding

Monitoring for Anomalous Rejoins

all

Implement monitoring to detect unusual rejoin activity in ZigBee networks

🧯 If You Can't Patch

  • Physically secure ZigBee network area to prevent unauthorized wireless access
  • Implement network redundancy with multiple coordinators to maintain service if one is attacked

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Silicon Labs advisory; test with controlled rejoin attempts if possible

Check Version:

Vendor-specific command via device management interface (check vendor documentation)

Verify Fix Applied:

Verify firmware version matches patched version from vendor; test that unsolicited rejoin responses no longer cause node ID changes

📡 Detection & Monitoring

Log Indicators:

  • Unexpected node ID changes in ZigBee network logs
  • Multiple rejoin attempts from unknown devices
  • Network coordinator reporting unexpected topology changes

Network Indicators:

  • Sudden loss of ZigBee network connectivity
  • Unusual rejoin traffic patterns
  • Node disappearance/reappearance with different IDs

SIEM Query:

ZigBee AND (rejoin OR "node ID change") AND NOT expected_device

🔗 References

📤 Share & Export