CVE-2025-7964

N/A Unknown

📋 TL;DR

This vulnerability allows an attacker to disrupt Zigbee networks by sending a malformed 802.15.4 MAC Data Request to a Zigbee Coordinator, causing it to send a 'network leave' request to Zigbee routers. This results in routers becoming stuck in a non-rejoinable state, requiring manual recommissioning to recover. It affects Zigbee networks using vulnerable coordinator implementations.

💻 Affected Systems

Products:
  • Silicon Labs Zigbee Coordinator implementations
Versions: Specific versions not specified in reference; likely affects multiple versions prior to patch
Operating Systems: Embedded systems running Zigbee stacks
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Zigbee networks using Silicon Labs coordinator implementations; routers and end devices are impacted indirectly.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Entire Zigbee network becomes permanently unavailable until all affected routers are manually recommissioned, causing extended service disruption for IoT devices.

🟠

Likely Case

Targeted routers become isolated from the network, requiring manual intervention to restore connectivity for connected end devices.

🟢

If Mitigated

Limited to isolated router disruption if network segmentation and monitoring are in place, with quick manual recovery possible.

🌐 Internet-Facing: LOW - Zigbee networks typically operate on isolated wireless protocols not directly internet-accessible.
🏢 Internal Only: MEDIUM - Requires physical proximity or access to the Zigbee network, but could cause significant disruption to internal IoT operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Requires sending malformed packet to coordinator

Exploitation requires access to the Zigbee network frequency and ability to craft malformed 802.15.4 packets.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in reference; check vendor advisory for specific versions

Vendor Advisory: https://community.silabs.com/068Vm00000dspiL

Restart Required: Yes

Instructions:

1. Check vendor advisory for affected versions. 2. Update Zigbee coordinator firmware to patched version. 3. Restart coordinator device. 4. Verify network functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Zigbee networks from untrusted devices using physical separation or network policies

Monitoring for Malformed Packets

all

Implement network monitoring to detect malformed 802.15.4 MAC Data Requests

🧯 If You Can't Patch

  • Implement strict physical access controls to Zigbee network areas
  • Deploy network monitoring to detect and alert on network leave events

🔍 How to Verify

Check if Vulnerable:

Check Zigbee coordinator firmware version against vendor advisory; monitor for unexpected network leave events

Check Version:

Vendor-specific command to check Zigbee stack version (consult device documentation)

Verify Fix Applied:

After patching, test by monitoring network stability and verifying no routers enter non-rejoinable state

📡 Detection & Monitoring

Log Indicators:

  • Unexpected 'network leave' requests from coordinator
  • Routers failing to rejoin network
  • Increased manual recommissioning events

Network Indicators:

  • Malformed 802.15.4 MAC Data Requests
  • Unusual packet patterns on Zigbee frequency

SIEM Query:

Zigbee coordinator logs showing network leave events without normal triggers

🔗 References

📤 Share & Export