CVE-2023-51392

Ember ZNet between v7.2.0 and v7.4.0 used software AES-CCM instead of integrated hardware cryptographic accelerators, potentially increasing risk of electromagnetic and differential power analysis sidechannel attacks.
References
Link Resource
https://community.silabs.com/068Vm000001BKm6 Permissions Required
https://community.silabs.com/068Vm000001BKm6 Permissions Required
Configurations

Configuration 1 (hide)

cpe:2.3:a:silabs:emberznet:*:*:*:*:*:*:*:*

History

12 Feb 2025, 18:49

Type Values Removed Values Added
First Time Silabs emberznet
Silabs
CPE cpe:2.3:a:silabs:emberznet:*:*:*:*:*:*:*:*
CWE CWE-327
References () https://community.silabs.com/068Vm000001BKm6 - () https://community.silabs.com/068Vm000001BKm6 - Permissions Required

Information

Published : 2024-02-23 17:15

Updated : 2025-02-12 18:49


NVD link : CVE-2023-51392

Mitre link : CVE-2023-51392

CVE.ORG link : CVE-2023-51392


JSON object : View

Products Affected

silabs

  • emberznet
CWE
CWE-1240

Use of a Cryptographic Primitive with a Risky Implementation

CWE-327

Use of a Broken or Risky Cryptographic Algorithm