Published At:12 Aug, 2024 | 13:38
Updated At:23 Aug, 2024 | 15:35
In certain Sonos products before Sonos S1 Release 11.12 and S2 release 15.9, a vulnerability exists in the U-Boot component of the firmware that allow persistent arbitrary code execution with Linux kernel privileges. A failure to correctly handle the return value of the setenv command can be used to override the kernel command-line parameters and ultimately bypass the Secure Boot implementation. This affects PLAY5 gen 2, PLAYBASE, PLAY:1, One, One SL, and Amp.
CISA Catalog
Date Added | Due Date | Vulnerability Name | Required Action |
---|
| N/A | | |
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
Type | Version | Base score | Base severity | Vector |
---|
Secondary | 3.1 | 6.0 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L |
Type: Secondary
Version: 3.1
Base score: 6.0
Base severity: MEDIUM
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L
Weaknesses
CWE ID | Type | Source |
---|
CWE-94 | Secondary | 134c704f-9b21-4f2e-91b3-4a467353bcc0 |
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0