In certain Sonos products before Sonos S1 Release 11.12 and S2 release 15.9, a vulnerability exists in the U-Boot component of the firmware that allow persistent arbitrary code execution with Linux kernel privileges. A failure to correctly handle the return value of the setenv command can be used to override the kernel command-line parameters and ultimately bypass the Secure Boot implementation. This affects PLAY5 gen 2, PLAYBASE, PLAY:1, One, One SL, and Amp.
History

Fri, 23 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Sonos
Sonos sonos Firmware
Weaknesses CWE-94
CPEs cpe:2.3:o:sonos:sonos_firmware:-:*:*:*:*:*:*:*
Vendors & Products Sonos
Sonos sonos Firmware
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 09 Aug 2024 21:15:00 +0000

Type Values Removed Values Added
Description In certain Sonos products before Sonos S1 Release 11.12 and S2 release 15.9, a vulnerability exists in the U-Boot component of the firmware that allow persistent arbitrary code execution with Linux kernel privileges. A failure to correctly handle the return value of the setenv command can be used to override the kernel command-line parameters and ultimately bypass the Secure Boot implementation. This affects PLAY5 gen 2, PLAYBASE, PLAY:1, One, One SL, and Amp.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-08-09T00:00:00

Updated: 2024-08-23T15:01:15.550Z

Reserved: 2023-12-14T00:00:00

Link: CVE-2023-50810

cve-icon Vulnrichment

Updated: 2024-08-23T14:56:13.018Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-12T13:38:12.023

Modified: 2024-08-23T15:35:03.107

Link: CVE-2023-50810

cve-icon Redhat

No data.