vendor:
Ksix Zigbee Devices
by:
Alejandro Vazquez Vazquez
9.8
CVSS
HIGH
Incorrect check of the "sequence number" field
284
CWE
Product Name: Ksix Zigbee Devices
Affected Version From: (Gateway Zigbee Module - v1.0.3, Gateway Main Module - v1.1.2, Door Sensor - v1.0.7, PIR Motion Sensor - v1.0.12)
Affected Version To: (Gateway Zigbee Module - v1.0.4, Gateway Main Module - v1.1.3, Door Sensor - v1.0.8, PIR Motion Sensor - v1.0.13)
Patch Exists: YES
Related CWE: CVE-2020-27093
CPE: a:ksixmobile:ksix_zigbee_devices
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Kali Linux 2020.3
2020
Ksix Zigbee Devices – Playback Protection Bypass (PoC)
The coordinator of the Zigbee network (Zigbee gateway) does not correctly check the sequence number of the packets that are sent to it, which allows forging messages from an end device to the coordinator (example: turn on a light bulb, open a door, ...) by injecting a very large value in the "sequence number" field.
Mitigation:
Update to the latest version of the firmware.