In certain Sonos products before S1 Release 11.12 and S2 release 15.9, the mt_7615.ko wireless driver does not properly validate an information element during negotiation of a WPA2 four-way handshake. This lack of validation leads to a stack buffer overflow. This can result in remote code execution within the kernel. This affects Amp, Arc, Arc SL, Beam, Beam Gen 2, Beam SL, and Five.
History

Thu, 24 Oct 2024 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-121

Tue, 13 Aug 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Sonos
Sonos s2
Weaknesses CWE-121
CPEs cpe:2.3:a:sonos:s2:*:*:*:*:*:*:*:*
Vendors & Products Sonos
Sonos s2
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 09 Aug 2024 21:15:00 +0000

Type Values Removed Values Added
Description In certain Sonos products before S1 Release 11.12 and S2 release 15.9, the mt_7615.ko wireless driver does not properly validate an information element during negotiation of a WPA2 four-way handshake. This lack of validation leads to a stack buffer overflow. This can result in remote code execution within the kernel. This affects Amp, Arc, Arc SL, Beam, Beam Gen 2, Beam SL, and Five.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-08-09T00:00:00

Updated: 2024-10-24T19:54:55.419Z

Reserved: 2023-12-14T00:00:00

Link: CVE-2023-50809

cve-icon Vulnrichment

Updated: 2024-08-13T13:59:32.777Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-12T13:38:11.923

Modified: 2024-10-24T20:35:04.223

Link: CVE-2023-50809

cve-icon Redhat

No data.