CVE-2025-14547: CWE-191 Integer Underflow (Wrap or Wraparound) in silabs.com Simplicity SDK
CVE-2025-14547 is an integer underflow vulnerability in Silicon Labs' Simplicity SDK, specifically within the PSA Crypto and SE Manager EC-JPAKE APIs during zero-knowledge proof (ZKP) parsing. Exploiting this flaw can cause an integer wraparound leading to a hard fault, resulting in a temporary denial of service (DoS). The vulnerability requires low privileges and no user interaction but has a low CVSS score of 2. 3, indicating limited impact. No known exploits are currently in the wild, and no patches have been released yet. The affected product is primarily used in embedded and IoT devices, which may limit the scope of impact. Organizations using Silicon Labs' Simplicity SDK in security-critical applications should monitor for updates and consider mitigations to prevent DoS conditions. Countries with significant IoT and embedded device deployments, especially those relying on Silicon Labs hardware, are more likely to be affected.
AI Analysis
Technical Summary
CVE-2025-14547 identifies an integer underflow vulnerability categorized under CWE-191 in Silicon Labs' Simplicity SDK, affecting the PSA Crypto and SE Manager EC-JPAKE APIs during the parsing of zero-knowledge proofs (ZKP). The flaw arises when an integer value unexpectedly wraps around due to underflow, causing the system to misinterpret data sizes or indices. This leads to a hard fault in the device's processor, which triggers a temporary denial of service by crashing or halting the affected component. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N), and it can be exploited remotely (AV:N) without the need for complex attack vectors. The CVSS 4.0 vector reflects a low severity score of 2.3, primarily because the impact is limited to availability and is temporary, with no direct compromise of confidentiality or integrity. The affected product, Simplicity SDK, is widely used in embedded systems and IoT devices developed by Silicon Labs, which are common in industrial, consumer, and smart home environments. No public exploits or patches are currently available, indicating the need for vigilance and proactive mitigation by users of the SDK. The vulnerability highlights the importance of robust input validation and error handling in cryptographic protocol implementations, especially in resource-constrained embedded environments.
Potential Impact
The primary impact of CVE-2025-14547 is a temporary denial of service caused by a hard fault triggered through an integer underflow during ZKP parsing. This can disrupt the normal operation of embedded devices relying on Silicon Labs' Simplicity SDK, potentially affecting availability of critical functions in IoT, industrial control, or consumer devices. While the vulnerability does not directly compromise confidentiality or integrity, repeated exploitation could degrade system reliability and availability, leading to operational interruptions. Organizations deploying affected devices in sensitive environments may face increased downtime or require manual resets, impacting service continuity. The low CVSS score reflects the limited scope and impact, but the risk is non-negligible in contexts where device availability is critical. Since no known exploits exist, the immediate threat is low, but the potential for future exploitation remains if patches are not applied promptly once available.
Mitigation Recommendations
To mitigate CVE-2025-14547, organizations should first monitor Silicon Labs' official channels for patches or updates addressing the integer underflow in the Simplicity SDK. In the absence of patches, developers should implement additional input validation and boundary checks when handling ZKP data to prevent underflow conditions. Employing runtime monitoring to detect and recover from hard faults can reduce downtime. Where feasible, isolate affected components to limit the impact of a DoS condition. Security teams should audit firmware versions and configurations to identify vulnerable devices and consider firmware rollbacks or temporary disabling of affected APIs if possible. Incorporating redundancy and failover mechanisms in critical systems can mitigate availability risks. Finally, coordinate with Silicon Labs support for guidance and participate in vulnerability disclosure programs to stay informed.
Affected Countries
United States, China, Germany, Japan, South Korea, United Kingdom, France, Netherlands, Taiwan, Singapore
CVE-2025-14547: CWE-191 Integer Underflow (Wrap or Wraparound) in silabs.com Simplicity SDK
Description
CVE-2025-14547 is an integer underflow vulnerability in Silicon Labs' Simplicity SDK, specifically within the PSA Crypto and SE Manager EC-JPAKE APIs during zero-knowledge proof (ZKP) parsing. Exploiting this flaw can cause an integer wraparound leading to a hard fault, resulting in a temporary denial of service (DoS). The vulnerability requires low privileges and no user interaction but has a low CVSS score of 2. 3, indicating limited impact. No known exploits are currently in the wild, and no patches have been released yet. The affected product is primarily used in embedded and IoT devices, which may limit the scope of impact. Organizations using Silicon Labs' Simplicity SDK in security-critical applications should monitor for updates and consider mitigations to prevent DoS conditions. Countries with significant IoT and embedded device deployments, especially those relying on Silicon Labs hardware, are more likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-14547 identifies an integer underflow vulnerability categorized under CWE-191 in Silicon Labs' Simplicity SDK, affecting the PSA Crypto and SE Manager EC-JPAKE APIs during the parsing of zero-knowledge proofs (ZKP). The flaw arises when an integer value unexpectedly wraps around due to underflow, causing the system to misinterpret data sizes or indices. This leads to a hard fault in the device's processor, which triggers a temporary denial of service by crashing or halting the affected component. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N), and it can be exploited remotely (AV:N) without the need for complex attack vectors. The CVSS 4.0 vector reflects a low severity score of 2.3, primarily because the impact is limited to availability and is temporary, with no direct compromise of confidentiality or integrity. The affected product, Simplicity SDK, is widely used in embedded systems and IoT devices developed by Silicon Labs, which are common in industrial, consumer, and smart home environments. No public exploits or patches are currently available, indicating the need for vigilance and proactive mitigation by users of the SDK. The vulnerability highlights the importance of robust input validation and error handling in cryptographic protocol implementations, especially in resource-constrained embedded environments.
Potential Impact
The primary impact of CVE-2025-14547 is a temporary denial of service caused by a hard fault triggered through an integer underflow during ZKP parsing. This can disrupt the normal operation of embedded devices relying on Silicon Labs' Simplicity SDK, potentially affecting availability of critical functions in IoT, industrial control, or consumer devices. While the vulnerability does not directly compromise confidentiality or integrity, repeated exploitation could degrade system reliability and availability, leading to operational interruptions. Organizations deploying affected devices in sensitive environments may face increased downtime or require manual resets, impacting service continuity. The low CVSS score reflects the limited scope and impact, but the risk is non-negligible in contexts where device availability is critical. Since no known exploits exist, the immediate threat is low, but the potential for future exploitation remains if patches are not applied promptly once available.
Mitigation Recommendations
To mitigate CVE-2025-14547, organizations should first monitor Silicon Labs' official channels for patches or updates addressing the integer underflow in the Simplicity SDK. In the absence of patches, developers should implement additional input validation and boundary checks when handling ZKP data to prevent underflow conditions. Employing runtime monitoring to detect and recover from hard faults can reduce downtime. Where feasible, isolate affected components to limit the impact of a DoS condition. Security teams should audit firmware versions and configurations to identify vulnerable devices and consider firmware rollbacks or temporary disabling of affected APIs if possible. Incorporating redundancy and failover mechanisms in critical systems can mitigate availability risks. Finally, coordinate with Silicon Labs support for guidance and participate in vulnerability disclosure programs to stay informed.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Silabs
- Date Reserved
- 2025-12-11T17:44:57.069Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69986fcd2c4d84f2609bdedd
Added to database: 2/20/2026, 2:29:33 PM
Last enriched: 2/20/2026, 2:44:10 PM
Last updated: 2/20/2026, 6:01:42 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2832: CWE-200 in HP Inc Samsung MultiXpress SL-X7600LXR, SL-X7500LXR, SL-X7400LXR
MediumCVE-2026-2851: Improper Access Controls in yeqifu warehouse
MediumCVE-2026-2850: Improper Access Controls in yeqifu warehouse
MediumCVE-2026-27115: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Alex4SSB ADB-Explorer
HighCVE-2026-26746: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.