Ember ZNet between v7.2.0 and v7.4.0 used software AES-CCM instead of integrated hardware cryptographic accelerators, potentially increasing risk of electromagnetic and differential power analysis sidechannel attacks.
References
| Link | Resource |
|---|---|
| https://community.silabs.com/068Vm000001BKm6 | Permissions Required |
| https://community.silabs.com/068Vm000001BKm6 | Permissions Required |
Configurations
History
12 Feb 2025, 18:49
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Silabs emberznet
Silabs |
|
| CPE | cpe:2.3:a:silabs:emberznet:*:*:*:*:*:*:*:* | |
| CWE | CWE-327 | |
| References | () https://community.silabs.com/068Vm000001BKm6 - Permissions Required |
Information
Published : 2024-02-23 17:15
Updated : 2025-02-12 18:49
NVD link : CVE-2023-51392
Mitre link : CVE-2023-51392
CVE.ORG link : CVE-2023-51392
JSON object : View
Products Affected
silabs
- emberznet
