In certain Sonos products before Sonos S1 Release 11.12 and S2 release 15.9, a vulnerability exists in the U-Boot component of the firmware that allow persistent arbitrary code execution with Linux kernel privileges. A failure to correctly handle the return value of the setenv command can be used to override the kernel command-line parameters and ultimately bypass the Secure Boot implementation. This affects PLAY5 gen 2, PLAYBASE, PLAY:1, One, One SL, and Amp.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.sonos.com/en-us/security-advisory-2024-0001 |
History
Fri, 23 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sonos
Sonos sonos Firmware |
|
Weaknesses | CWE-94 | |
CPEs | cpe:2.3:o:sonos:sonos_firmware:-:*:*:*:*:*:*:* | |
Vendors & Products |
Sonos
Sonos sonos Firmware |
|
Metrics |
cvssV3_1
|
Fri, 09 Aug 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In certain Sonos products before Sonos S1 Release 11.12 and S2 release 15.9, a vulnerability exists in the U-Boot component of the firmware that allow persistent arbitrary code execution with Linux kernel privileges. A failure to correctly handle the return value of the setenv command can be used to override the kernel command-line parameters and ultimately bypass the Secure Boot implementation. This affects PLAY5 gen 2, PLAYBASE, PLAY:1, One, One SL, and Amp. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-08-09T00:00:00
Updated: 2024-08-23T15:01:15.550Z
Reserved: 2023-12-14T00:00:00
Link: CVE-2023-50810
Vulnrichment
Updated: 2024-08-23T14:56:13.018Z
NVD
Status : Awaiting Analysis
Published: 2024-08-12T13:38:12.023
Modified: 2024-08-23T15:35:03.107
Link: CVE-2023-50810
Redhat
No data.