Vulnerability Description
A Zigbee Radio Co-Processor (RCP), which is using SiLabs EmberZNet Zigbee stack, was unable to send messages to the host system (CPCd) due to heavy Zigbee traffic, resulting in a Denial of Service (DoS) attack, Only hard reset will bring the device to normal operation
Related Weaknesses (CWE)
References
- https://community.silabs.com/068Vm00000Sadyn
- https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-7.
- https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-8.
- https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-8.
FAQ
What is CVE-2025-1221?
CVE-2025-1221 is a documented vulnerability. A Zigbee Radio Co-Processor (RCP), which is using SiLabs EmberZNet Zigbee stack, was unable to send messages to the host system (CPCd) due to heavy Zigbee traffic, resulting in a Denial of Service (Do...
How severe is CVE-2025-1221?
CVSS scoring is not yet available for CVE-2025-1221. Check NVD for updates.
Is there a patch for CVE-2025-1221?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.