Skip to main content

CVE-2023-24678: n/a in n/a

High
VulnerabilityCVE-2023-24678cvecve-2023-24678
Published: Fri Mar 17 2023 (03/17/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

A vulnerability in Centralite Pearl Thermostat 0x04075010 allows attackers to cause a Denial of Service (DoS) via a crafted Zigbee message.

AI-Powered Analysis

AILast updated: 07/03/2025, 12:26:09 UTC

Technical Analysis

CVE-2023-24678 is a high-severity vulnerability affecting the Centralite Pearl Thermostat, identified by the product code 0x04075010. The vulnerability allows an unauthenticated remote attacker to cause a Denial of Service (DoS) condition by sending a specially crafted Zigbee message to the device. Zigbee is a wireless communication protocol commonly used in smart home and IoT devices for low-power, short-range communication. The vulnerability does not impact confidentiality or integrity but directly affects availability by causing the thermostat to become unresponsive or crash, disrupting its normal operation. The CVSS 3.1 base score of 7.5 reflects the ease of exploitation (network vector, no privileges or user interaction required) and the significant impact on availability. Since the vulnerability is triggered via Zigbee messages, an attacker must be within wireless range or have access to the Zigbee network, which somewhat limits the attack surface compared to internet-exposed devices. No patches or vendor advisories have been linked yet, and no known exploits in the wild have been reported as of the publication date. However, the vulnerability poses a risk to environments relying on Centralite Pearl Thermostats for climate control, especially in smart building or home automation contexts where availability is critical. The lack of detailed vendor or product version information limits the scope of precise mitigation guidance, but the nature of the vulnerability suggests that network segmentation and Zigbee network security are key defensive measures.

Potential Impact

For European organizations, the impact of this vulnerability could be significant in sectors where Centralite Pearl Thermostats are deployed at scale, such as commercial buildings, smart offices, healthcare facilities, and residential smart home environments. A successful DoS attack could disrupt heating, ventilation, and air conditioning (HVAC) systems, leading to discomfort, potential damage to sensitive equipment, and operational downtime. In critical infrastructure or healthcare settings, loss of environmental controls could have safety implications. Additionally, disruption of smart building systems could affect energy management and increase operational costs. Although the vulnerability does not allow data theft or device takeover, the availability impact alone can cause operational challenges and may require manual intervention to restore normal function. The requirement for proximity or Zigbee network access somewhat limits remote exploitation risk but does not eliminate it, especially in dense urban environments or multi-tenant buildings where Zigbee networks may overlap or be accessible to attackers.

Mitigation Recommendations

1. Implement strict Zigbee network access controls: Use strong Zigbee network keys and rotate them regularly to prevent unauthorized devices from joining the network. 2. Segment Zigbee networks from other critical IT and OT networks to limit lateral movement and exposure. 3. Monitor Zigbee network traffic for anomalous or malformed messages that could indicate exploitation attempts. 4. Physically secure Zigbee coordinators and gateways to prevent tampering or unauthorized access. 5. If possible, disable unused Zigbee endpoints or features on the thermostat to reduce attack surface. 6. Engage with the device vendor or supplier to obtain firmware updates or patches addressing this vulnerability once available. 7. Consider deploying intrusion detection systems capable of analyzing Zigbee protocol traffic for early warning of attacks. 8. For critical environments, maintain manual override or backup environmental controls to mitigate impact during outages. 9. Educate facility management and security teams about the risks associated with Zigbee-based devices and the importance of wireless network security.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-01-30T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc4ba

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 12:26:09 PM

Last updated: 8/7/2025, 7:58:58 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats