VYPR

Sonos S1

by Sonos

CVEs (6)

  • CVE-2023-50809HigAug 12, 2024
    risk 0.51cvss 7.8epss 0.03

    In certain Sonos products before S1 Release 11.12 and S2 release 15.9, the mt_7615.ko wireless driver does not properly validate an information element during negotiation of a WPA2 four-way handshake. This lack of validation leads to a stack buffer overflow. This can result in…

  • CVE-2023-50810MedAug 12, 2024
    risk 0.39cvss 6.0epss 0.00

    In certain Sonos products before Sonos S1 Release 11.12 and S2 release 15.9, a vulnerability exists in the U-Boot component of the firmware that allow persistent arbitrary code execution with Linux kernel privileges. A failure to correctly handle the return value of the setenv…

  • CVE-2024-5269Jun 6, 2024
    risk 0.00cvss epss 0.03

    Sonos Era 100 SMB2 Message Handling Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos Era 100 smart speakers. Authentication is not required to exploit this…

  • CVE-2024-5268Jun 6, 2024
    risk 0.00cvss epss 0.00

    Sonos Era 100 SMB2 Message Handling Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Sonos Era 100 smart speakers. Authentication is not required to…

  • CVE-2024-5267Jun 6, 2024
    risk 0.00cvss epss 0.01

    Sonos Era 100 SMB2 Message Handling Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos Era 100 smart speakers. Authentication is not required to exploit this…

  • CVE-2024-5256Jun 6, 2024
    risk 0.00cvss epss 0.00

    Sonos Era 100 SMB2 Message Handling Integer Underflow Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Sonos Era 100 smart speakers. Authentication is not required to exploit…