First published: Wed Jun 21 2023(Updated: )
A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an authenticated attacker within Z-Wave range to manipulate an array pointer to disclose the contents of global memory.
Credit: product-security@silabs.com product-security@silabs.com
Affected Software | Affected Version | How to fix |
---|---|---|
Silabs Z\/ip Gateway Sdk | <=7.18.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-0969 is low with a severity value of 3.5.
CVE-2023-0969 affects SiLabs Z/IP Gateway versions up to and including 7.18.01.
The vulnerability type for CVE-2023-0969 is CWE-119 and CWE-125.
No, CVE-2023-0969 requires an authenticated attacker within Z-Wave range to exploit the vulnerability.
The vendor has released an updated version of the SiLabs Z/IP Gateway SDK to address the vulnerability. Please refer to the vendor's advisories for more information.