Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.sonos.com/en-us/security-advisory-2024-0001 |
|
Fri, 23 Aug 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sonos
Sonos sonos Firmware |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:o:sonos:sonos_firmware:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Sonos
Sonos sonos Firmware |
|
| Metrics |
cvssV3_1
|
Fri, 09 Aug 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In certain Sonos products before Sonos S1 Release 11.12 and S2 release 15.9, a vulnerability exists in the U-Boot component of the firmware that allow persistent arbitrary code execution with Linux kernel privileges. A failure to correctly handle the return value of the setenv command can be used to override the kernel command-line parameters and ultimately bypass the Secure Boot implementation. This affects PLAY5 gen 2, PLAYBASE, PLAY:1, One, One SL, and Amp. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-23T15:01:15.550Z
Reserved: 2023-12-14T00:00:00.000Z
Link: CVE-2023-50810
Updated: 2024-08-23T14:56:13.018Z
Status : Deferred
Published: 2024-08-12T13:38:12.023
Modified: 2026-04-15T00:35:42.020
Link: CVE-2023-50810
No data.
OpenCVE Enrichment
No data.