CVE-2025-10693
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-31

Last updated on: 2025-11-04

Assigner: Silicon Graphics (SGI)

Description
When SmartStart Inclusion fails during the onboarding of a Z-Wave PIR sensor, the sensor will join the network as a non-secure device. This vulnerability exists in Silicon Labs' Z-Wave PIR Sensor Reference design delivered as part of SiSDK v2025.6.0 and v2025.6.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-31
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-11-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
silicon_labs si_sdk 2025.6.1
silicon_labs si_sdk 2025.6.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-757 A protocol or its implementation supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the strongest algorithm that is available to both parties.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs when the SmartStart Inclusion process fails during the onboarding of a Z-Wave PIR sensor. As a result, the sensor joins the network as a non-secure device instead of a secure one. This issue affects Silicon Labs' Z-Wave PIR Sensor Reference design in SiSDK versions 2025.6.0 and 2025.6.1.


How can this vulnerability impact me? :

Because the sensor joins the network as a non-secure device, it may expose the network to unauthorized access or attacks, potentially compromising the security and integrity of the Z-Wave network and connected devices.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart