Navigatie overslaan

Shoppen

  • Koptelefoon
  • Speakers
  • Draagbare speakers
  • Home Cinema
  • Speakersets
  • Soundbars
  • Accessoires
  • Inbouwoplossingen
  • Audio Componenten
  • Bestel alle

Leer meer

  • Hoe Sonos werkt
  • Home Cinema

Ondersteuning

Radio

Populaire zoekopdrachten

  • 1

Mijn account

  • Mijn profiel
  • Bestellingen
  • Systeem
  • Upgrade
  • Aanbiedingen
  • Abonnementen
  • Beta
  • Community
Uitloggen
  • Shoppen
  • Leer meer
  • Ondersteuning
  • Radio
  • Aanmelden
Security Advisory: 2024-0001
Advisory ID: SSA-2024-0001
Severity: High
Issue Date: 2024-08-01
CVE(s): CVE-2023-50810, CVE-2023-50809

Synopsis: Recent software updates address multiple security vulnerabilities (CVE-2023-50810, CVE-2023-50809)

1. Impacted Products
  • All S1 and S2 Systems.

Affected versions: All releases prior to Sonos S2 release 15.9, and Sonos S1 release 11.12

2. Introduction
Multiple vulnerabilities were privately reported to Sonos. Updates are available to remediate these vulnerabilities in affected Sonos products.

3. Persistent Code Execution (CVE-2023-50810)
Description: A vulnerability exists in the U-Boot component of the firmware which would allow for persistent arbitrary code execution with Linux kernel privileges.
Known Attack Vectors: A malicious actor with physical access to the device or by obtaining write access to the flash memory through a separate runtime vulnerability may be able to exploit this.
Resolution: To remediate CVE-2023-50810 apply the update Sonos S2 release 15.9
Workarounds: None
Additional Documentation: None
Notes: None
Acknowledgments: Sonos would like to thank Alexander Plaskett and NCC Group for their responsible disclosure by reporting this issue to us.

4. Remote Code Execution (CVE-2023-50809)
Description: A vulnerability exists in the affected devices wireless driver that does not properly validate an information element while negotiating a WPA2 four-way handshake.
Known Attack Vectors: A low-privileged, close-proximity attacker could exploit this vulnerability to remotely execute arbitrary code.
Resolution: To remediate CVE-2023-50809 apply the update Sonos S2 release 15.9
Workarounds: None
Additional Documentation: The link to the MediaTek driver security advisory lives here: https://corp.mediatek.com/product-security-bulletin/March-2024
Notes: None
Acknowledgments: Sonos would like to thank Alexander Plaskett and NCC Group for their responsible disclosure by reporting this issue to us.
  • Ons bedrijf
  • Nieuws
  • Blog
  • Vacatures
  • Verantwoordelijkheid
  • Innovatie
  • Neem contact met ons op
  • Je account beheren
  • Status bestelling
  • Verzending en bezorging
  • Retourneringen en garantie
  • Betaalmogelijkheden
  • Studenten
  • Zoek een winkel
  • Investeerders
  • Werkt met Sonos
  • Developerportal
  • Sonos Radio
  • Sonos-app
  • Upgrade
  • Corporate sales
  • Dealerstore
  • © 2025 Sonos, Inc.
  • Juridisch
  • Privacyverklaring
  • Accessibility
  • Conformiteitsverklaring
  • Sitemap
  • Beveiliging
  • Cookie-instellingen
  • Product Security Advisories
  • Argentina
  • Australia
  • België ― Belgique
  • Canada (English) ― Canada (Français)
  • Chile
  • 中国
  • Colombia
  • Danmark
  • Deutschland
  • España
  • France
  • India
  • Ireland
  • Italia
  • 日本
  • México
  • Nederland
  • New Zealand
  • Norge
  • Österreich
  • Polska
  • Schweiz ― Svizzera ― Suisse
  • Suomi
  • Sverige
  • United Kingdom
  • United States ― Estados Unidos
  • Other countries (English)