Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23150 | A Zigbee Radio Co-Processor (RCP), which is using SiLabs EmberZNet Zigbee stack, was unable to send messages to the host system (CPCd) due to heavy Zigbee traffic, resulting in a Denial of Service (DoS) attack, Only hard reset will bring the device to normal operation |
Wed, 30 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Silabs
Silabs emberznet |
|
| Vendors & Products |
Silabs
Silabs emberznet |
Wed, 30 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 30 Jul 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Zigbee Radio Co-Processor (RCP), which is using SiLabs EmberZNet Zigbee stack, was unable to send messages to the host system (CPCd) due to heavy Zigbee traffic, resulting in a Denial of Service (DoS) attack, Only hard reset will bring the device to normal operation | |
| Title | DoS in Zigbee device due to heavy traffic | |
| Weaknesses | CWE-667 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Silabs
Published:
Updated: 2025-07-30T13:40:39.039Z
Reserved: 2025-02-11T05:43:30.180Z
Link: CVE-2025-1221
Updated: 2025-07-30T13:40:33.353Z
Status : Deferred
Published: 2025-07-30T08:15:33.133
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-1221
No data.
OpenCVE Enrichment
Updated: 2025-07-30T15:04:13Z
EUVD