In certain Sonos products before S1 Release 11.12 and S2 release 15.9, the mt_7615.ko wireless driver does not properly validate an information element during negotiation of a WPA2 four-way handshake. This lack of validation leads to a stack buffer overflow. This can result in remote code execution within the kernel. This affects Amp, Arc, Arc SL, Beam, Beam Gen 2, Beam SL, and Five.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.sonos.com/en-us/security-advisory-2024-0001 |
History
Thu, 24 Oct 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-121 |
Tue, 13 Aug 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sonos
Sonos s2 |
|
Weaknesses | CWE-121 | |
CPEs | cpe:2.3:a:sonos:s2:*:*:*:*:*:*:*:* | |
Vendors & Products |
Sonos
Sonos s2 |
|
Metrics |
cvssV3_1
|
Fri, 09 Aug 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In certain Sonos products before S1 Release 11.12 and S2 release 15.9, the mt_7615.ko wireless driver does not properly validate an information element during negotiation of a WPA2 four-way handshake. This lack of validation leads to a stack buffer overflow. This can result in remote code execution within the kernel. This affects Amp, Arc, Arc SL, Beam, Beam Gen 2, Beam SL, and Five. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-08-09T00:00:00
Updated: 2024-10-24T19:54:55.419Z
Reserved: 2023-12-14T00:00:00
Link: CVE-2023-50809
Vulnrichment
Updated: 2024-08-13T13:59:32.777Z
NVD
Status : Awaiting Analysis
Published: 2024-08-12T13:38:11.923
Modified: 2024-10-24T20:35:04.223
Link: CVE-2023-50809
Redhat
No data.