In certain Sonos products before Sonos S1 Release 11.12...
Moderate severity
Unreviewed
Published
Aug 12, 2024
to the GitHub Advisory Database
•
Updated Aug 23, 2024
Description
Published by the National Vulnerability Database
Aug 12, 2024
Published to the GitHub Advisory Database
Aug 12, 2024
Last updated
Aug 23, 2024
In certain Sonos products before Sonos S1 Release 11.12 and S2 release 15.9, a vulnerability exists in the U-Boot component of the firmware that allow persistent arbitrary code execution with Linux kernel privileges. A failure to correctly handle the return value of the setenv command can be used to override the kernel command-line parameters and ultimately bypass the Secure Boot implementation. This affects PLAY5 gen 2, PLAYBASE, PLAY:1, One, One SL, and Amp.
References