The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic.
https://www.pentestpartners.com/security-blog/z-shave-exploiting-z-wave-downgrade-attacks/