CVE-2025-10693: CWE-757 Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') in silabs.com Silicon Labs Z-Wave SDK
When SmartStart Inclusion fails during the onboarding of a Z-Wave PIR sensor, the sensor will join the network as a non-secure device. This vulnerability exists in Silicon Labs' Z-Wave PIR Sensor Reference design delivered as part of SiSDK v2025.6.0 and v2025.6.1.
AI Analysis
Technical Summary
CVE-2025-10693 is a vulnerability classified under CWE-757 (Selection of Less-Secure Algorithm During Negotiation, also known as an algorithm downgrade attack) found in Silicon Labs' Z-Wave SDK, specifically version 2025.6.0. The issue arises during the SmartStart Inclusion process of Z-Wave PIR sensors, where a failure in onboarding causes the sensor to join the Z-Wave network as a non-secure device rather than using secure communication protocols. This downgrade from secure to non-secure communication effectively bypasses the cryptographic protections intended to safeguard the network and its devices. The vulnerability stems from the SDK's reference design for the PIR sensor, which does not enforce fallback to secure algorithms or abort the inclusion process upon failure, allowing an attacker to exploit this behavior. The attack vector is network-based, requiring no prior authentication but necessitating user interaction during device onboarding. The CVSS 4.0 score of 7.6 reflects high severity, with significant impacts on confidentiality and integrity, as attackers could intercept or manipulate sensor data or commands. Availability impact is low, and there is no scope change beyond the vulnerable component. No public exploits have been reported yet, but the vulnerability poses a substantial risk to IoT environments relying on Z-Wave technology for security and automation. The flaw highlights the importance of robust secure onboarding mechanisms in IoT device ecosystems.
Potential Impact
For European organizations, especially those deploying smart home, building automation, or industrial IoT solutions using Silicon Labs Z-Wave devices, this vulnerability could lead to unauthorized access to sensor data and control commands. Compromised PIR sensors could allow attackers to bypass security controls, potentially facilitating further lateral movement within networks or triggering false alarms and disabling security systems. The confidentiality of sensor data is at high risk, which may include presence detection or environmental monitoring information. Integrity is also severely impacted as attackers could inject malicious commands or spoof sensor readings. Although availability impact is low, the overall trustworthiness of the IoT environment is undermined. This could have regulatory implications under GDPR if personal data is exposed or manipulated. Organizations relying on Z-Wave for critical security functions may face operational disruptions or reputational damage. The lack of known exploits currently provides a window for proactive mitigation, but the widespread use of Z-Wave in European smart buildings and homes increases the potential attack surface.
Mitigation Recommendations
1. Immediately audit all Z-Wave PIR sensors and related devices to identify those running the vulnerable SDK version 2025.6.0 or 2025.6.1. 2. Engage with Silicon Labs or device vendors for patches or updated SDK versions that address the SmartStart Inclusion failure and enforce secure onboarding. 3. Implement strict monitoring of device onboarding processes to detect and alert on any failures or non-secure device joins. 4. Enforce network segmentation to isolate IoT devices from critical infrastructure and sensitive data networks. 5. Disable or restrict SmartStart Inclusion where possible until patches are applied, or require manual secure inclusion procedures. 6. Educate users and administrators on the risks of insecure device onboarding and the importance of verifying device security status post-inclusion. 7. Employ network-level intrusion detection systems tuned to detect anomalous Z-Wave traffic patterns indicative of downgrade or unauthorized device behavior. 8. Maintain an inventory of all Z-Wave devices and their firmware versions to facilitate timely updates and vulnerability management. 9. Consider alternative secure IoT protocols or devices if patching is delayed or unsupported. 10. Review and update incident response plans to include IoT-specific attack scenarios involving algorithm downgrade vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Denmark, Belgium, Italy, Spain, Finland
CVE-2025-10693: CWE-757 Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') in silabs.com Silicon Labs Z-Wave SDK
Description
When SmartStart Inclusion fails during the onboarding of a Z-Wave PIR sensor, the sensor will join the network as a non-secure device. This vulnerability exists in Silicon Labs' Z-Wave PIR Sensor Reference design delivered as part of SiSDK v2025.6.0 and v2025.6.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-10693 is a vulnerability classified under CWE-757 (Selection of Less-Secure Algorithm During Negotiation, also known as an algorithm downgrade attack) found in Silicon Labs' Z-Wave SDK, specifically version 2025.6.0. The issue arises during the SmartStart Inclusion process of Z-Wave PIR sensors, where a failure in onboarding causes the sensor to join the Z-Wave network as a non-secure device rather than using secure communication protocols. This downgrade from secure to non-secure communication effectively bypasses the cryptographic protections intended to safeguard the network and its devices. The vulnerability stems from the SDK's reference design for the PIR sensor, which does not enforce fallback to secure algorithms or abort the inclusion process upon failure, allowing an attacker to exploit this behavior. The attack vector is network-based, requiring no prior authentication but necessitating user interaction during device onboarding. The CVSS 4.0 score of 7.6 reflects high severity, with significant impacts on confidentiality and integrity, as attackers could intercept or manipulate sensor data or commands. Availability impact is low, and there is no scope change beyond the vulnerable component. No public exploits have been reported yet, but the vulnerability poses a substantial risk to IoT environments relying on Z-Wave technology for security and automation. The flaw highlights the importance of robust secure onboarding mechanisms in IoT device ecosystems.
Potential Impact
For European organizations, especially those deploying smart home, building automation, or industrial IoT solutions using Silicon Labs Z-Wave devices, this vulnerability could lead to unauthorized access to sensor data and control commands. Compromised PIR sensors could allow attackers to bypass security controls, potentially facilitating further lateral movement within networks or triggering false alarms and disabling security systems. The confidentiality of sensor data is at high risk, which may include presence detection or environmental monitoring information. Integrity is also severely impacted as attackers could inject malicious commands or spoof sensor readings. Although availability impact is low, the overall trustworthiness of the IoT environment is undermined. This could have regulatory implications under GDPR if personal data is exposed or manipulated. Organizations relying on Z-Wave for critical security functions may face operational disruptions or reputational damage. The lack of known exploits currently provides a window for proactive mitigation, but the widespread use of Z-Wave in European smart buildings and homes increases the potential attack surface.
Mitigation Recommendations
1. Immediately audit all Z-Wave PIR sensors and related devices to identify those running the vulnerable SDK version 2025.6.0 or 2025.6.1. 2. Engage with Silicon Labs or device vendors for patches or updated SDK versions that address the SmartStart Inclusion failure and enforce secure onboarding. 3. Implement strict monitoring of device onboarding processes to detect and alert on any failures or non-secure device joins. 4. Enforce network segmentation to isolate IoT devices from critical infrastructure and sensitive data networks. 5. Disable or restrict SmartStart Inclusion where possible until patches are applied, or require manual secure inclusion procedures. 6. Educate users and administrators on the risks of insecure device onboarding and the importance of verifying device security status post-inclusion. 7. Employ network-level intrusion detection systems tuned to detect anomalous Z-Wave traffic patterns indicative of downgrade or unauthorized device behavior. 8. Maintain an inventory of all Z-Wave devices and their firmware versions to facilitate timely updates and vulnerability management. 9. Consider alternative secure IoT protocols or devices if patching is delayed or unsupported. 10. Review and update incident response plans to include IoT-specific attack scenarios involving algorithm downgrade vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Silabs
- Date Reserved
- 2025-09-18T14:59:31.624Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69050e83f07fd4df0f173843
Added to database: 10/31/2025, 7:31:15 PM
Last enriched: 10/31/2025, 7:42:25 PM
Last updated: 11/1/2025, 4:07:45 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-36367: CWE-862 Missing Authorization
HighCVE-2025-6990: CWE-94 Improper Control of Generation of Code ('Code Injection') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
HighCVE-2025-6988: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
MediumCVE-2025-6574: CWE-639 Authorization Bypass Through User-Controlled Key in aonetheme Service Finder Bookings
HighCVE-2025-12171: CWE-434 Unrestricted Upload of File with Dangerous Type in anthonyeden RESTful Content Syndication
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.