First published: Fri Feb 23 2024(Updated: )
Ember ZNet between v7.2.0 and v7.4.0 used software AES-CCM instead of integrated hardware cryptographic accelerators, potentially increasing risk of electromagnetic and differential power analysis sidechannel attacks.
Credit: product-security@silabs.com
Affected Software | Affected Version | How to fix |
---|---|---|
Silicon Labs Ember ZNet SDK | >=7.2.0<=7.2.4 | |
Silicon Labs Ember ZNet SDK | >=7.2.0<7.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51392 has a moderate severity due to its potential for side-channel attacks.
To fix CVE-2023-51392, update your Ember ZNet SDK to a version above 7.4.0.
CVE-2023-51392 affects Ember ZNet SDK versions between 7.2.0 and 7.4.0.
CVE-2023-51392 potentially exposes systems to electromagnetic and differential power analysis side-channel attacks.
There are no confirmed workarounds for CVE-2023-51392, so upgrading is the recommended solution.