Multiple safety flaws uncovered in Sonos One wi-fi audio system may very well be doubtlessly exploited to attain info disclosure and distant code execution, the Zero Day Initiative (ZDI) mentioned in a report printed final week.
The vulnerabilities had been demonstrated by three totally different groups from Qrious Secure, STAR Labs, and DEVCORE on the Pwn2Own hacking contest held in Toronto late final yr, netting them $105,000 in financial rewards.
The listing of 4 flaws, which influence Sonos One Speaker 70.3-35220, is under –
- CVE-2023-27352 and CVE-2023-27355 (CVSS scores: 8.8) – Unauthenticated flaws that permit network-adjacent attackers to execute arbitrary code on affected installations.
- CVE-2023-27353 and CVE-2023-27354 (CVSS rating: 6.5) – Unauthenticated flaws that permit network-adjacent attackers to reveal delicate info on affected installations.
While CVE-2023-27352 stems from when processing SMB listing question instructions, CVE-2023-27355 exists inside the MPEG-TS parser.
Zero Trust + Deception: Learn How to Outsmart Attackers!
Discover how Deception can detect superior threats, cease lateral motion, and improve your Zero Trust technique. Join our insightful webinar!
Successful exploitation of each shortcomings might allow an attacker to execute arbitrary code within the context of the foundation consumer.
Both the data disclosure flaws could be mixed individually with different flaws within the programs to attain code execution with elevated privileges.
Following accountable disclosure on December 29, 2022, the issues had been addressed by Sonos as a part of Sonos S2 and S1 software program variations 15.1 and 11.7.1, respectively. Users are advisable to use the newest patches to mitigate potential dangers.