Hacker Wins $105,000 for Reporting Critical Security Flaw in Sonos One Speakers

May 30, 2023Ravie LakshmananZero Day / Vulnerability

Several security flaws found in the Sonos One wireless speaker could potentially be exploited to achieve remote information disclosure and code execution, the Zero Day Initiative (ZDI). said in a report published last week.

The vulnerability was demonstrated by three different teams from Qrious Secure, STAR Labs, and DEVCORE at the Pwn2Own hacking contest held in Toronto late last year, earning them $105,000 in prize money.

A list of four drawbacks, affecting the Sonos One Speaker 70.3-35220, is below –

  • CVE-2023-27352 And CVE-2023-27355 (CVSS score: 8.8) – An unauthenticated flaw that allowed a network-adjacent attacker to execute arbitrary code on affected installations.
  • CVE-2023-27353 And CVE-2023-27354 (CVSS score: 6.5) – An unauthenticated flaw that allowed a network-adjacent attacker to reveal sensitive information on affected installations.

While CVE-2023-27352 originates from while processing an SMB directory request command, CVE-2023-27355 is in an MPEG-TS parser.


Zero Trust + Deception: Learn How to Outsmart Attackers!

Discover how Fraud can detect advanced threats, stop lateral moves, and improve your Zero Trust strategy. Join our insightful webinar!

Save My Seat!

Successful exploitation of both flaws could allow an attacker to execute arbitrary code in the context of the root user.

These two information disclosure weaknesses can be combined separately with other weaknesses in the system to achieve code execution with higher privileges.

Following a responsible disclosure on December 29, 2022, the flaw was addressed by Sonos as part of the Sonos S2 and S1 software versions 15.1 and 11.7.1 respectively. Users are advised to apply the latest patches to mitigate potential risks.

Found this article interesting? Follow us on Twitter And LinkedIn to read more exclusive content we post.

Source link

Related Articles

Back to top button