Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14547: CWE-191 Integer Underflow (Wrap or Wraparound) in silabs.com Simplicity SDK

0
Low
VulnerabilityCVE-2025-14547cvecve-2025-14547cwe-191
Published: Fri Feb 20 2026 (02/20/2026, 14:11:05 UTC)
Source: CVE Database V5
Vendor/Project: silabs.com
Product: Simplicity SDK

Description

An integer underflow vulnerability is present in Silicon Lab’s implementation of PSA Crypto and SE Manager EC-JPAKE APIs during ZKP parsing. Triggering the underflow can lead to a hard fault, causing a temporary denial of service.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:10:50 UTC

Technical Analysis

CVE-2025-14547 identifies an integer underflow vulnerability (CWE-191) in Silicon Labs' Simplicity SDK, specifically within the PSA Crypto and SE Manager EC-JPAKE APIs during the parsing of zero-knowledge proofs (ZKP). The vulnerability arises when the code handling ZKP parsing performs arithmetic operations that can wrap around due to underflow, leading to unexpected behavior. This underflow can trigger a hard fault in the device, causing a temporary denial of service by crashing or halting the affected process. The flaw requires low privileges (PR:L) but no user interaction (UI:N) and can be exploited remotely (AV:N) without compromising confidentiality, integrity, or availability beyond the DoS impact. The affected versions are unspecified beyond version 0, and no patches or known exploits have been reported. The vulnerability is rated low severity with a CVSS 4.0 score of 2.3, reflecting limited impact and ease of exploitation. The Simplicity SDK is widely used in embedded systems and IoT devices for cryptographic operations, making this vulnerability relevant to those environments. The root cause is insufficient bounds checking or improper handling of integer arithmetic during ZKP parsing, which should be addressed by the vendor to prevent service interruptions.

Potential Impact

The primary impact of CVE-2025-14547 is a temporary denial of service caused by a hard fault when the integer underflow is triggered during ZKP parsing. This can disrupt cryptographic operations in embedded or IoT devices using the Simplicity SDK, potentially affecting device availability and reliability. While it does not directly compromise confidentiality or integrity, the DoS could interrupt critical security functions or device operations, leading to operational downtime. Organizations relying on Silicon Labs' SDK in security-sensitive or real-time environments may face service degradation or outages. The low CVSS score and absence of known exploits suggest limited immediate risk, but the vulnerability could be leveraged in targeted attacks to disrupt services. The scope is limited to devices using the affected SDK components, which are common in IoT and embedded markets. Overall, the impact is low but non-negligible for critical infrastructure or security-focused deployments.

Mitigation Recommendations

To mitigate CVE-2025-14547, organizations should: 1) Monitor Silicon Labs' official channels for patches or updates addressing the integer underflow in the Simplicity SDK and apply them promptly once available. 2) Implement additional input validation and bounds checking on ZKP data before processing to prevent malformed inputs from triggering underflows. 3) Employ runtime monitoring and anomaly detection on devices to identify unexpected crashes or hard faults related to cryptographic operations. 4) Where feasible, isolate critical cryptographic functions to limit the impact of potential DoS conditions. 5) Conduct thorough code reviews and static analysis on custom integrations of the SDK to detect similar integer handling issues. 6) Engage with Silicon Labs support for guidance on interim workarounds or configuration changes that may reduce exposure. 7) Maintain robust device recovery mechanisms to minimize downtime in case of faults. These steps go beyond generic advice by focusing on proactive validation, monitoring, and vendor engagement specific to the affected SDK and cryptographic context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Silabs
Date Reserved
2025-12-11T17:44:57.069Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69986fcd2c4d84f2609bdedd

Added to database: 2/20/2026, 2:29:33 PM

Last enriched: 2/28/2026, 2:10:50 PM

Last updated: 4/7/2026, 6:49:36 AM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses