Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14055: CWE-191 Integer Underflow (Wrap or Wraparound) in silabs.com Simplicity SDK

0
Low
VulnerabilityCVE-2025-14055cvecve-2025-14055cwe-191cwe-125
Published: Fri Feb 20 2026 (02/20/2026, 14:45:10 UTC)
Source: CVE Database V5
Vendor/Project: silabs.com
Product: Simplicity SDK

Description

An integer underflow vulnerability in Silicon Labs Secure NCP host implementation allows a buffer overread via a specially crafted packet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:10:34 UTC

Technical Analysis

CVE-2025-14055 identifies an integer underflow vulnerability in the Secure NCP host implementation within Silicon Labs' Simplicity SDK. The vulnerability arises from improper handling of integer arithmetic that causes a wraparound condition (CWE-191), which in turn leads to a buffer overread (CWE-125) when processing specially crafted network packets. This buffer overread can expose memory contents beyond intended boundaries, potentially leaking sensitive information or causing erratic behavior. The affected product is the Simplicity SDK, widely used in embedded and IoT devices that incorporate Silicon Labs wireless modules. The vulnerability requires an attacker to be in physical proximity (local network access) to send crafted packets, as indicated by the CVSS vector (AV:P). No authentication or user interaction is required, but the impact on confidentiality and integrity is limited, and availability is not affected. The CVSS 4.0 base score of 2.4 reflects these factors, categorizing the risk as low. No public exploits or active exploitation have been reported to date. The lack of available patches at the time of publication necessitates vigilance and interim mitigations. This vulnerability highlights the risks inherent in embedded wireless communication stacks where integer arithmetic errors can lead to memory safety issues. Organizations using the Simplicity SDK in their products should prioritize monitoring and prepare to deploy vendor fixes once released.

Potential Impact

The primary impact of CVE-2025-14055 is potential information disclosure due to buffer overread caused by integer underflow. Attackers with local network access can send crafted packets to affected devices, potentially reading sensitive memory areas. While this does not directly enable code execution or denial of service, leaked memory contents could include cryptographic keys, credentials, or other sensitive data, which might facilitate further attacks. The vulnerability affects embedded and IoT devices using Silicon Labs Simplicity SDK, which are often deployed in industrial, smart home, and commercial environments. The limited attack vector (physical proximity) and low CVSS score reduce the overall risk, but organizations with large deployments of affected devices could face increased exposure. The absence of known exploits reduces immediate threat, but the potential for future exploitation exists if attackers develop techniques to leverage leaked information. This vulnerability may also undermine trust in device security and complicate compliance with data protection regulations if sensitive data is exposed.

Mitigation Recommendations

Organizations should implement the following mitigations: 1) Network segmentation to isolate devices using the Simplicity SDK, limiting exposure to local network attackers. 2) Deploy strict packet filtering and anomaly detection to identify and block malformed or suspicious packets targeting the Secure NCP host interface. 3) Monitor device logs and network traffic for unusual activity indicative of exploitation attempts. 4) Engage with Silicon Labs for updates and patches; apply vendor-provided fixes promptly once available. 5) Conduct code reviews and security testing on custom implementations using the Simplicity SDK to identify and remediate similar integer handling issues. 6) Where feasible, disable or restrict access to the affected Secure NCP host functionality if not required. 7) Educate operational staff about the risks of local network attacks and enforce physical security controls to limit attacker proximity. These targeted actions go beyond generic advice by focusing on the specific attack vector and product context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Silabs
Date Reserved
2025-12-04T17:50:34.480Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69987a5a2c4d84f260a3d5a2

Added to database: 2/20/2026, 3:14:34 PM

Last enriched: 2/28/2026, 2:10:34 PM

Last updated: 4/4/2026, 11:20:23 PM

Views: 120

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses