Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12986: CWE-410 Insufficient Resource Pool in silabs.com Gecko SDK

0
Medium
VulnerabilityCVE-2025-12986cvecve-2025-12986cwe-410
Published: Thu Dec 04 2025 (12/04/2025, 21:55:59 UTC)
Source: CVE Database V5
Vendor/Project: silabs.com
Product: Gecko SDK

Description

When a WF200/WGM160P device is configured to operate as an Access Point, it may be vulnerable to a denial of service triggered by a malformed packet. The device may recover automatically or require a hard reset.

AI-Powered Analysis

AILast updated: 12/04/2025, 22:22:48 UTC

Technical Analysis

CVE-2025-12986 identifies a denial of service vulnerability in the Silicon Labs Gecko SDK, specifically impacting WF200 and WGM160P wireless modules when configured as Access Points. The root cause is an insufficient resource pool (CWE-410), meaning the device's internal resources allocated for handling network packets can be exhausted or improperly managed when processing a specially crafted malformed packet. This leads to a DoS condition where the device either crashes or becomes unresponsive. Recovery may be automatic or require a manual hard reset, depending on the device state. The vulnerability is exploitable remotely without authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates an attack over adjacent network (e.g., Wi-Fi range), low attack complexity, no privileges required, no user interaction, and a high impact on availability only. No known exploits have been reported yet, but the vulnerability's presence in widely used IoT and embedded wireless modules raises concerns for network reliability and operational continuity. The absence of a patch at the time of publication necessitates proactive mitigation strategies.

Potential Impact

For European organizations, especially those relying on Silicon Labs WF200/WGM160P modules in wireless infrastructure such as industrial IoT, smart building systems, or enterprise Wi-Fi networks, this vulnerability poses a risk of network outages and service interruptions. A successful DoS attack could disrupt critical communications, impacting operational technology environments, manufacturing processes, or public services. The potential need for manual device resets could increase operational costs and downtime. Given the remote exploitability without authentication, attackers within wireless range could cause disruptions without needing network credentials. This risk is heightened in environments with dense deployments of these devices or where wireless access points serve as critical connectivity nodes. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as exploit development could follow disclosure.

Mitigation Recommendations

Organizations should implement the following specific mitigations: 1) Monitor Silicon Labs communications and security advisories closely for patches or firmware updates addressing CVE-2025-12986 and apply them promptly. 2) Employ network segmentation to isolate vulnerable wireless access points from critical network segments, limiting potential impact. 3) Use wireless intrusion detection/prevention systems (WIDS/WIPS) to detect and block malformed packets or anomalous traffic patterns targeting these devices. 4) Limit physical and wireless access to authorized personnel to reduce the attack surface. 5) Regularly audit and inventory devices using the affected Gecko SDK modules to identify exposure. 6) Consider deploying redundant access points or failover mechanisms to maintain availability in case of DoS. 7) Engage with vendors or integrators to confirm device firmware versions and update schedules. These steps go beyond generic advice by focusing on network-level controls and operational continuity planning tailored to the affected hardware and deployment scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Silabs
Date Reserved
2025-11-10T22:42:20.103Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693206ca2bd9ee5f78fbc0da

Added to database: 12/4/2025, 10:10:18 PM

Last enriched: 12/4/2025, 10:22:48 PM

Last updated: 12/5/2025, 12:30:02 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats