{"vulnerability": "cve-2013-20003", "sightings": [{"uuid": "94a4ee4d-202d-4046-80ec-0123078036fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2013-20003", "type": "seen", "source": "https://t.me/cibsecurity/36895", "content": "\u203c CVE-2013-20003 \u203c\n\nZ-Wave devices from Sierra Designs (circa 2013) and Silicon Labs (using S0 security) may use a known, shared network key of all zeros, allowing an attacker within radio range to spoof Z-Wave traffic.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-05T02:42:29.000000Z"}, {"uuid": "839b4475-ba6e-4f97-b039-cdab481189e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2013-20003", "type": "seen", "source": "https://t.me/VulnerabilityNews/26524", "content": "The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic.\nPublished at: February 05, 2022 at 12:15AM\nView on website", "creation_timestamp": "2022-02-05T02:42:52.000000Z"}]}