Ember ZNet between v7.2.0 and v7.4.0 used software AES-CCM instead of integrated hardware cryptographic accelerators, potentially increasing risk of electromagnetic and differential power analysis sidechannel attacks.
To fulfill the need for a cryptographic primitive, the product implements a cryptographic algorithm using a non-standard, unproven, or disallowed/non-compliant cryptographic implementation.
The product uses a broken or risky cryptographic algorithm or protocol.
Link | Tags |
---|---|
https://community.silabs.com/068Vm000001BKm6 | permissions required |