2024-08-13 16:03:13 +00:00

60 lines
2.2 KiB
JSON

{
"id": "CVE-2023-50809",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:11.923",
"lastModified": "2024-08-13T14:35:00.967",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In certain Sonos products before S1 Release 11.12 and S2 release 15.9, the mt_7615.ko wireless driver does not properly validate an information element during negotiation of a WPA2 four-way handshake. This lack of validation leads to a stack buffer overflow. This can result in remote code execution within the kernel. This affects Amp, Arc, Arc SL, Beam, Beam Gen 2, Beam SL, and Five."
},
{
"lang": "es",
"value": "En ciertos productos Sonos anteriores a la versi\u00f3n S1 11.12 y S2 versi\u00f3n 15.9, el controlador inal\u00e1mbrico mt_7615.ko no valida correctamente un elemento de informaci\u00f3n durante la negociaci\u00f3n de un protocolo de enlace de cuatro v\u00edas WPA2. Esta falta de validaci\u00f3n provoca un desbordamiento del b\u00fafer de pila. Esto puede resultar en la ejecuci\u00f3n remota de c\u00f3digo dentro del kernel. Esto afecta a Amp, Arc, Arc SL, Beam, Beam Gen 2, Beam SL y Five."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.sonos.com/en-us/security-advisory-2024-0001",
"source": "cve@mitre.org"
}
]
}