Bishop Fox named “Leader” in 2024 GigaOm Radar for Attack Surface Management. Read the Report ›

How to Set Up Zniffer for Z-Wave

Wolf sniffing motherboard


At Bishop Fox, we regularly run product security reviews of our clients’ hardware, many of which require the use of specialized equipment. During a recent security assessment of a device that communicated exclusively over the Z-Wave protocol, we worked with Z-Wave sniffing tools and we ran into a few challenges. During the process, we learned a fair amount about Z-Wave Zniffer and Z-Wave Programmer – insights that we wanted to share with readers who may be doing similar work.

The Zniffer Basics

Z-Wave is a wireless communications protocol that uses low-energy radio waves to communicate with compliant devices. It is primarily used for home automation devices like lighting controls and smart home security systems.

To assess these types of devices, we needed to capture the communications passing through Z-Wave protocol to check both the transport-level encryption in use and the security of the Z-Wave network during the pairing and unpairing of devices. Certain downgrade attacks can be carried out during the pairing process, so to keep an eye on Z-Wave security during the event, we needed to sniff the wireless traffic to simulate what a malicious third-party attacker would do. The specific tool for sniffing Z-Wave networks is called Zniffer, created by Silicon Labs. We’re grateful they created such a useful tool for this kind of work and would like to thank them for making it available to the community.

Zniffer is an official development tool for capturing Z-Wave RF that is free after registering with the site. Since we found the flashing process tricky to get right the first time, we decided to create a detailed walk-through to help other hardware security testers get their Zniffer setup running quickly.

Hardware Equipments

Ideally, the Zniffer firmware can be flashed onto any Z-Wave compatible development stick, but we stuck to the following Z-Wave controller, which worked for our US-based testing: ACC-UZB3-U-STA

(For devices with EU-compatible RF ranges, the comparable model is ACC-UZB3-E-STA.)

We also used a Aeotec Z-stick Gen5 to build our own Z-Wave gateway. This step is optional, but it ensured that our sniffer was working as intended.

Software Requirements

To get started, download and install the official embedded development tools from the Silicon Labs menu shown below:

Z Wave hardware and software official embedded development tools from the Silicon Labs menu
Figure 1: You’ll need to download both development tools for the setup

These tools are for the Windows platform only, and ideally, you should attempt these on a native Windows machine i.e., not a Windows VM. (Note: once the flashing process was done, we observed that the Windows VM worked just as well as native Windows for sniffing purposes.)

Steps for Flashing the Sniffer Firmware

  1. Unplug all other Z-Wave devices from the machine.
  2. Install the USB driver (not the UZB driver ) for the Z-Wave PC Programmer. It should be named zw05xxprg.sys within the PC\ZW050x_USB_Programming_Driver directory. Right click on zw05xxprg.inf and hit Install.
  3. Once you have the driver in place, plug in the Z-Wave Controller. It should be detected as a COM interface (You can double-check that within Device Manager).
  4. Open the Z-Wave PC Programmer. Under Settings, the Serial Interface should appear as follows:
Showing how the Z-Wave PC Programmer and how the Serial Interface should appear.

Make sure that the correct driver is loaded.

  1. Check for the correct driver by clicking Tools> Detect Target. If you get the following driver error, it’s most likely because the Zniffer UZB driver was installed before the USB driver.

    The connection for the USB device 'Sigma Designs IOUSBHostDevice' was unsuccessful. Driver error.

  2. Install the USB driver for the Z-Wave PC Programmer and restart the application to fix this. If working correctly, the correct target should be identified as shown below:

Now that the correct target is detected, the firmware can be flashed. If the hardware is configured properly, the current Programming Interface should be set to USB by default. Under the Flash Code Memory tab, select its hex file location:
Zniffer_v4_57\Z-Wave_Firmware\sniffer_ZW050x_USBVCP.hexHit Program and Verify. This process will take anywhere between 2-5 minutes and provides status updates throughout.Once the flashing process is complete, the Zniffer application can be tested.

Steps for Testing Out the Sniffer Application

  1. Swap the USB driver for the UZB driver. (Once the programming is done, the programmer driver is no longer needed.) Install the UZB driver from the following location:Zniffer_v4_57\PC\uzb.inf
  2. Unplug the Z-Wave USB device and then plug it back in.
  3. Restart the Zniffer application and hit Detect Modules. The correct version of the firmware should be visible within both the toolbar and the menu bars. If the firmware version was not detected (e.g., if it shows up as “COM4 (v0.00 ZW0000)”), then start over from the top—reinstall the driver, unplug/replug the device, and restart the application. There is always a possibility that the flashing process was not completed successfully.
  4. To make sure our Zniffer works as expected, we used the Z-Wave gateway that we set up using Aeotec Z-stick Gen5 to view the traffic:
Successful capture of Z-Wave Protocol traffic
Figure 2: Successful capture of Z-Wave Protocol traffic

Once we got the Zniffer up and running, we followed our product security review methodology and tested the security of the pairing process and its resilience against protocol downgrade attacks.

Official Resources for Z-Wave Developmental Tools:

Z-Wave Programmer:

Z-Wave Zniffer:

Subscribe to Bishop Fox's Security Blog

Be first to learn about latest tools, advisories, and findings.

Priyank nigam

About the author, Priyank Nigam

Senior Security Consultant

Priyank Nigam (OSCP, OSWP, GCFE) is a Senior Security Consultant at Bishop Fox. He focuses on source code reviews, web and mobile application penetration testing, and network security. As a researcher, he is interested in all things offensive security, reverse engineering, mobile security, Internet of Things.
More by Priyank

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.