{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-7322","assignerOrgId":"030b2754-1501-44a4-bef8-48be86a33bf4","state":"PUBLISHED","assignerShortName":"Silabs","dateReserved":"2024-07-31T09:01:54.841Z","datePublished":"2025-01-15T07:59:55.430Z","dateUpdated":"2026-04-20T15:10:01.669Z"},"containers":{"cna":{"providerMetadata":{"orgId":"030b2754-1501-44a4-bef8-48be86a33bf4","shortName":"Silabs","dateUpdated":"2026-04-20T15:10:01.669Z"},"title":"Dos in ZigBee device due to unsolicited encrypted rejoin response","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-940","description":"CWE-940 Improper Verification of Source of a Communication Channel","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-176","descriptions":[{"lang":"en","value":"CAPEC-176 Configuration/Environment Manipulation"}]}],"affected":[{"vendor":"silabs.com","product":"EmberZNet","packageName":"GSDK","versions":[{"status":"affected","version":"0","lessThan":"7.3.3","versionType":"semver"},{"status":"affected","version":"7.4.0","lessThan":"7.4.4","versionType":"semver"}],"defaultStatus":"unaffected"},{"vendor":"silabs.com","product":"EmberZNet","packageName":"SiSDK","versions":[{"status":"affected","version":"0","lessThan":"8.1.0","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A ZigBee coordinator, router, or end device may change their node ID when an unsolicited encrypted rejoin response is received, this change in node ID causes Denial of Service (DoS). To recover from this DoS, the network must be re-established","supportingMedia":[{"type":"text/html","base64":false,"value":"A ZigBee coordinator, router, or end device may change their node ID when an unsolicited encrypted rejoin response is received, this change&nbsp;in node ID causes Denial of Service (DoS). To recover from this DoS, the network must be re-established"}]}],"references":[{"url":"https://community.silabs.com/068Vm00000I7ri2","tags":["vendor-advisory","permissions-required"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseSeverity":"MEDIUM","baseScore":5.8,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-15T14:46:49.430161Z","id":"CVE-2024-7322","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-15T14:46:57.645Z"}}]}}