CVE-2025-14547: CWE-191 Integer Underflow (Wrap or Wraparound) in silabs.com Simplicity SDK
An integer underflow vulnerability is present in Silicon Lab’s implementation of PSA Crypto and SE Manager EC-JPAKE APIs during ZKP parsing. Triggering the underflow can lead to a hard fault, causing a temporary denial of service.
AI Analysis
Technical Summary
CVE-2025-14547 identifies an integer underflow vulnerability (CWE-191) in Silicon Labs' Simplicity SDK, specifically within the PSA Crypto and SE Manager EC-JPAKE APIs during the parsing of zero-knowledge proofs (ZKP). The vulnerability arises when the code handling ZKP parsing performs arithmetic operations that can wrap around due to underflow, leading to unexpected behavior. This underflow can trigger a hard fault in the device, causing a temporary denial of service by crashing or halting the affected process. The flaw requires low privileges (PR:L) but no user interaction (UI:N) and can be exploited remotely (AV:N) without compromising confidentiality, integrity, or availability beyond the DoS impact. The affected versions are unspecified beyond version 0, and no patches or known exploits have been reported. The vulnerability is rated low severity with a CVSS 4.0 score of 2.3, reflecting limited impact and ease of exploitation. The Simplicity SDK is widely used in embedded systems and IoT devices for cryptographic operations, making this vulnerability relevant to those environments. The root cause is insufficient bounds checking or improper handling of integer arithmetic during ZKP parsing, which should be addressed by the vendor to prevent service interruptions.
Potential Impact
The primary impact of CVE-2025-14547 is a temporary denial of service caused by a hard fault when the integer underflow is triggered during ZKP parsing. This can disrupt cryptographic operations in embedded or IoT devices using the Simplicity SDK, potentially affecting device availability and reliability. While it does not directly compromise confidentiality or integrity, the DoS could interrupt critical security functions or device operations, leading to operational downtime. Organizations relying on Silicon Labs' SDK in security-sensitive or real-time environments may face service degradation or outages. The low CVSS score and absence of known exploits suggest limited immediate risk, but the vulnerability could be leveraged in targeted attacks to disrupt services. The scope is limited to devices using the affected SDK components, which are common in IoT and embedded markets. Overall, the impact is low but non-negligible for critical infrastructure or security-focused deployments.
Mitigation Recommendations
To mitigate CVE-2025-14547, organizations should: 1) Monitor Silicon Labs' official channels for patches or updates addressing the integer underflow in the Simplicity SDK and apply them promptly once available. 2) Implement additional input validation and bounds checking on ZKP data before processing to prevent malformed inputs from triggering underflows. 3) Employ runtime monitoring and anomaly detection on devices to identify unexpected crashes or hard faults related to cryptographic operations. 4) Where feasible, isolate critical cryptographic functions to limit the impact of potential DoS conditions. 5) Conduct thorough code reviews and static analysis on custom integrations of the SDK to detect similar integer handling issues. 6) Engage with Silicon Labs support for guidance on interim workarounds or configuration changes that may reduce exposure. 7) Maintain robust device recovery mechanisms to minimize downtime in case of faults. These steps go beyond generic advice by focusing on proactive validation, monitoring, and vendor engagement specific to the affected SDK and cryptographic context.
Affected Countries
United States, China, Germany, Japan, South Korea, Taiwan, United Kingdom, France, Netherlands, Canada
CVE-2025-14547: CWE-191 Integer Underflow (Wrap or Wraparound) in silabs.com Simplicity SDK
Description
An integer underflow vulnerability is present in Silicon Lab’s implementation of PSA Crypto and SE Manager EC-JPAKE APIs during ZKP parsing. Triggering the underflow can lead to a hard fault, causing a temporary denial of service.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14547 identifies an integer underflow vulnerability (CWE-191) in Silicon Labs' Simplicity SDK, specifically within the PSA Crypto and SE Manager EC-JPAKE APIs during the parsing of zero-knowledge proofs (ZKP). The vulnerability arises when the code handling ZKP parsing performs arithmetic operations that can wrap around due to underflow, leading to unexpected behavior. This underflow can trigger a hard fault in the device, causing a temporary denial of service by crashing or halting the affected process. The flaw requires low privileges (PR:L) but no user interaction (UI:N) and can be exploited remotely (AV:N) without compromising confidentiality, integrity, or availability beyond the DoS impact. The affected versions are unspecified beyond version 0, and no patches or known exploits have been reported. The vulnerability is rated low severity with a CVSS 4.0 score of 2.3, reflecting limited impact and ease of exploitation. The Simplicity SDK is widely used in embedded systems and IoT devices for cryptographic operations, making this vulnerability relevant to those environments. The root cause is insufficient bounds checking or improper handling of integer arithmetic during ZKP parsing, which should be addressed by the vendor to prevent service interruptions.
Potential Impact
The primary impact of CVE-2025-14547 is a temporary denial of service caused by a hard fault when the integer underflow is triggered during ZKP parsing. This can disrupt cryptographic operations in embedded or IoT devices using the Simplicity SDK, potentially affecting device availability and reliability. While it does not directly compromise confidentiality or integrity, the DoS could interrupt critical security functions or device operations, leading to operational downtime. Organizations relying on Silicon Labs' SDK in security-sensitive or real-time environments may face service degradation or outages. The low CVSS score and absence of known exploits suggest limited immediate risk, but the vulnerability could be leveraged in targeted attacks to disrupt services. The scope is limited to devices using the affected SDK components, which are common in IoT and embedded markets. Overall, the impact is low but non-negligible for critical infrastructure or security-focused deployments.
Mitigation Recommendations
To mitigate CVE-2025-14547, organizations should: 1) Monitor Silicon Labs' official channels for patches or updates addressing the integer underflow in the Simplicity SDK and apply them promptly once available. 2) Implement additional input validation and bounds checking on ZKP data before processing to prevent malformed inputs from triggering underflows. 3) Employ runtime monitoring and anomaly detection on devices to identify unexpected crashes or hard faults related to cryptographic operations. 4) Where feasible, isolate critical cryptographic functions to limit the impact of potential DoS conditions. 5) Conduct thorough code reviews and static analysis on custom integrations of the SDK to detect similar integer handling issues. 6) Engage with Silicon Labs support for guidance on interim workarounds or configuration changes that may reduce exposure. 7) Maintain robust device recovery mechanisms to minimize downtime in case of faults. These steps go beyond generic advice by focusing on proactive validation, monitoring, and vendor engagement specific to the affected SDK and cryptographic context.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Silabs
- Date Reserved
- 2025-12-11T17:44:57.069Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69986fcd2c4d84f2609bdedd
Added to database: 2/20/2026, 2:29:33 PM
Last enriched: 2/28/2026, 2:10:50 PM
Last updated: 4/7/2026, 6:49:36 AM
Views: 91
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.