In certain Sonos products before Sonos S1 Release 11.12 and S2 release 15.9, a vulnerability exists in the U-Boot component of the firmware that allow persistent arbitrary code execution with Linux kernel privileges. A failure to correctly handle the return value of the setenv command can be used to override the kernel command-line parameters and ultimately bypass the Secure Boot implementation. This affects PLAY5 gen 2, PLAYBASE, PLAY:1, One, One SL, and Amp.
References
Link | Resource |
---|---|
https://www.sonos.com/en-us/security-advisory-2024-0001 |
Configurations
No configuration.
History
No history.
Information
Published : 2024-08-12 13:38
Updated : 2024-08-23 15:35
NVD link : CVE-2023-50810
Mitre link : CVE-2023-50810
CVE.ORG link : CVE-2023-50810
JSON object : View
Products Affected
No product.
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')