CVE-2025-1221
BaseFortify
Publication date: 2025-07-30
Last updated on: 2025-07-31
Assigner: Silicon Graphics (SGI)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a Zigbee Radio Co-Processor (RCP) using the SiLabs EmberZNet Zigbee stack that fails to send messages to the host system (CPCd) when there is heavy Zigbee traffic. This failure results in a Denial of Service (DoS) condition where the device stops functioning normally and requires a hard reset to recover.
How can this vulnerability impact me? :
The impact of this vulnerability is a Denial of Service (DoS) attack on the affected device, causing it to stop sending messages and become unresponsive until a hard reset is performed. This can disrupt normal operation and availability of the device relying on the Zigbee Radio Co-Processor.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to perform a hard reset on the affected Zigbee Radio Co-Processor device to restore normal operation.