Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14055: CWE-191 Integer Underflow (Wrap or Wraparound) in silabs.com Simplicity SDK

0
Low
VulnerabilityCVE-2025-14055cvecve-2025-14055cwe-191cwe-125
Published: Fri Feb 20 2026 (02/20/2026, 14:45:10 UTC)
Source: CVE Database V5
Vendor/Project: silabs.com
Product: Simplicity SDK

Description

An integer underflow vulnerability in Silicon Labs Secure NCP host implementation allows a buffer overread via a specially crafted packet.

AI-Powered Analysis

AILast updated: 02/20/2026, 15:28:53 UTC

Technical Analysis

CVE-2025-14055 identifies a vulnerability classified as CWE-191 (Integer Underflow) and CWE-125 (Out-of-bounds Read) within the Silicon Labs Simplicity SDK, specifically in the Secure NCP host implementation. The root cause is an integer underflow condition where an arithmetic operation on an integer variable results in a value wrapping around to an unexpectedly large number, leading to incorrect buffer size calculations. When the SDK processes a specially crafted packet, this underflow causes the software to perform a buffer overread, reading memory beyond the allocated buffer. This can expose sensitive data or cause application crashes. The vulnerability does not require authentication or user interaction, but the attack vector is physical, implying an attacker must have direct or local network access to the device. The CVSS 4.0 vector indicates low attack complexity and no privileges required, but the physical attack vector limits remote exploitation. No patches or known exploits are currently available, and the affected versions are not explicitly detailed beyond version '0', suggesting early or initial releases. The Simplicity SDK is widely used in embedded systems and IoT devices for wireless communication, making this vulnerability relevant to those sectors. The vulnerability's impact is primarily confidentiality and integrity-related due to potential data leakage or application instability.

Potential Impact

The primary impact of CVE-2025-14055 is the potential for buffer overread leading to information disclosure or application instability in devices using the Silicon Labs Simplicity SDK. This could allow attackers with physical or local network access to extract sensitive information from device memory or cause denial of service through crashes. While the vulnerability does not enable remote exploitation over the internet, it poses risks in environments where attackers can interact directly with devices, such as industrial control systems, smart home hubs, or IoT gateways. The limited attack vector reduces the scope but does not eliminate risk in critical infrastructure or sensitive deployments. Organizations relying on affected devices may face confidentiality breaches or operational disruptions if exploited. The absence of known exploits and patches currently reduces immediate risk but underscores the need for vigilance. The low CVSS score reflects the limited attack surface and impact severity but does not negate the importance of addressing the flaw in security-sensitive contexts.

Mitigation Recommendations

To mitigate CVE-2025-14055, organizations should first identify all devices using the Silicon Labs Simplicity SDK, particularly those implementing the Secure NCP host. Since no patches are currently available, apply compensating controls such as network segmentation to restrict physical and local network access to vulnerable devices. Implement strict access controls and monitoring to detect anomalous packet traffic that could exploit this vulnerability. Engage with Silicon Labs for updates or security advisories and plan to apply patches promptly once released. For developers, review and audit code handling integer arithmetic and buffer management to prevent underflow conditions. Employ fuzz testing and static analysis tools focused on integer operations and boundary checks. In deployment, consider disabling or limiting unnecessary network interfaces or protocols that expose the vulnerable component. Maintain an incident response plan to quickly address potential exploitation attempts. Finally, document and track affected assets to ensure timely remediation when updates become available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Silabs
Date Reserved
2025-12-04T17:50:34.480Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69987a5a2c4d84f260a3d5a2

Added to database: 2/20/2026, 3:14:34 PM

Last enriched: 2/20/2026, 3:28:53 PM

Last updated: 2/20/2026, 9:59:13 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats