Malformed Device Reset Locally Command Class packets can be sent to the controller, causing the controller to assume the end device has left the network. After this, frames sent by the end device will not be acknowledged by the controller. This vulnerability exists in PC Controller v5.54.0, and earlier.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://community.silabs.com/068Vm000001HdNm |
![]() ![]() |
History
Wed, 12 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Silabs
Silabs z-wave Pc-based Controller |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:silabs:z-wave_pc-based_controller:*:*:*:*:*:*:*:* | |
Vendors & Products |
Silabs
Silabs z-wave Pc-based Controller |
Fri, 27 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-345 CWE-754 |
|
Metrics |
ssvc
|
Fri, 27 Sep 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Malformed Device Reset Locally Command Class packets can be sent to the controller, causing the controller to assume the end device has left the network. After this, frames sent by the end device will not be acknowledged by the controller. This vulnerability exists in PC Controller v5.54.0, and earlier. | Malformed Device Reset Locally Command Class packets can be sent to the controller, causing the controller to assume the end device has left the network. After this, frames sent by the end device will not be acknowledged by the controller. This vulnerability exists in PC Controller v5.54.0, and earlier. |
Title | Silicon Labs PC Controller Denial of Service Vulnerability | Silicon Labs PC Controller Denial of Service Vulnerability |
Weaknesses | CWE-248 CWE-419 |

Status: PUBLISHED
Assigner: Silabs
Published:
Updated: 2024-09-27T15:52:58.406Z
Reserved: 2023-12-05T18:59:45.077Z
Link: CVE-2023-6533

Updated: 2024-08-02T08:35:14.652Z

Status : Analyzed
Published: 2024-02-21T20:15:46.283
Modified: 2025-02-12T16:57:31.787
Link: CVE-2023-6533

No data.