CVE-2025-1221
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-07-30

Last updated on: 2025-07-31

Assigner: Silicon Graphics (SGI)

Description
A Zigbee Radio Co-Processor (RCP), which is using SiLabs EmberZNet Zigbee stack, was unable to send messages to the host system (CPCd) due to heavy Zigbee traffic, resulting in a Denial of Service (DoS) attack, Only hard reset will bring the device to normal operation
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-30
Last Modified
2025-07-31
Generated
2026-05-07
AI Q&A
2025-07-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-667 The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves a Zigbee Radio Co-Processor (RCP) using the SiLabs EmberZNet Zigbee stack that fails to send messages to the host system (CPCd) when there is heavy Zigbee traffic. This failure results in a Denial of Service (DoS) condition where the device stops functioning normally and requires a hard reset to recover.


How can this vulnerability impact me? :

The impact of this vulnerability is a Denial of Service (DoS) attack on the affected device, causing it to stop sending messages and become unresponsive until a hard reset is performed. This can disrupt normal operation and availability of the device relying on the Zigbee Radio Co-Processor.


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to perform a hard reset on the affected Zigbee Radio Co-Processor device to restore normal operation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart