Malformed Device Reset Locally Command Class packets can be sent to the controller, causing the controller to assume the end device has left the network. After this, frames sent by the end device will not be acknowledged by the controller. This vulnerability exists in PC Controller v5.54.0, and earlier.
Published 2024-02-21 20:15:46
Updated 2025-02-12 16:57:32
Source Silicon Labs
View at NVD,   CVE.org

Products affected by CVE-2023-6533

Exploit prediction scoring system (EPSS) score for CVE-2023-6533

0.03%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 7 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2023-6533

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
6.5
MEDIUM CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.8
3.6
NIST 2025-02-12
6.5
MEDIUM CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.8
3.6
Silicon Labs 2024-02-21

CWE ids for CVE-2023-6533

  • An exception is thrown from a function, but it is not caught.
    Assigned by: product-security@silabs.com (Secondary)
  • The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
    Assigned by: product-security@silabs.com (Secondary)
  • The product uses a primary channel for administration or restricted functionality, but it does not properly protect the channel.
    Assigned by: product-security@silabs.com (Secondary)
  • The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.
    Assigned by: product-security@silabs.com (Secondary)

References for CVE-2023-6533

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!