
Cybersecurity researchers have exposed weaknesses in Sonos sensible audio system that may be exploited through malicious actors to clandestinely listen in on customers.
The vulnerabilities “led to a complete damage within the safety of Sonos’s safe boot procedure throughout a variety of gadgets and remotely having the ability to compromise a number of gadgets over the air,” NCC Team safety researchers Alex Plaskett and Robert Herrera mentioned.
A hit exploitation of any such flaws may permit a far off attacker to procure covert audio seize from Sonos gadgets by way of an over-the-air assault. They affect all variations previous to Sonos S2 liberate 15.9 and Sonos S1 liberate 11.12, that have been shipped in October and November 2023.
The findings have been introduced at Black Hat USA 2024. An outline of the 2 safety defects is as follows –
- CVE-2023-50809 – A vulnerability within the Sonos One Gen 2 Wi-Fi stack does now not correctly validate a knowledge part whilst negotiating a WPA2 four-way handshake, resulting in far off code execution
- CVE-2023-50810 – A vulnerability within the U-Boot part of the Sonos Generation-100 firmware that will permit for power arbitrary code execution with Linux kernel privileges
NCC Team, which reverse-engineered the boot procedure to reach far off code execution on Sonos Generation-100 and the Sonos One gadgets, mentioned CVE-2023-50809 is the results of a reminiscence corruption vulnerability within the Sonos One’s wi-fi motive force, which is a third-party chipset manufactured through MediaTek.

“In wlan motive force, there’s a imaginable out of bounds write because of unsuitable enter validation,” MediaTek mentioned in an advisory for CVE-2024-20018. “This might result in native escalation of privilege without a further execution privileges wanted. Person interplay isn’t wanted for exploitation.”
The preliminary get admission to got on this means paves the way in which for a chain of post-exploitation steps that come with acquiring a complete shell at the software to achieve entire keep an eye on over the sensible speaker within the context of root adopted through deploying a singular Rust implant able to taking pictures audio from the microphone inside of shut bodily proximity to the speaker.
The opposite flaw, CVE-2023-50810, pertains to a series of vulnerabilities recognized within the safe boot procedure to breach Generation-100 gadgets, successfully making it imaginable to bypass safety controls to permit for unsigned code execution within the context of the kernel.

This might then be mixed with an N-day privilege escalation flaw to facilitate ARM EL3 stage code execution and extract hardware-backed cryptographic secrets and techniques.
“General, there are two vital conclusions to attract from this analysis,” the researchers mentioned. “The primary is that OEM parts want to be of the similar safety same old as in-house parts. Distributors must additionally carry out danger modeling of the entire exterior assault surfaces in their merchandise and be sure that all far off vectors had been topic to enough validation.”
“When it comes to the safe boot weaknesses, then it is very important validate and carry out trying out of the boot chain to be sure that those weaknesses aren’t presented. Each {hardware} and software-based assault vectors must be thought to be.”
The disclosure comes as firmware safety corporate Binarly published that masses of UEFI merchandise from just about a dozen distributors are vulnerable to a crucial firmware delivery chain factor referred to as PKfail, which permits attackers to circumvent Safe Boot and set up malware.
In particular, it discovered that masses of goods use a check Platform Key generated through American Megatrends World (AMI), which was once most probably incorporated of their reference implementation in hopes that it will get replaced with any other safely-generated key through downstream entities within the delivery chain.

“The issue arises from the Safe Boot ‘grasp key,’ referred to as the Platform Key (PK) in UEFI terminology, which is untrusted as a result of it’s generated through Unbiased BIOS Distributors (IBVs) and shared amongst other distributors,” it mentioned, describing it as a cross-silicon factor affecting each x86 and ARM architectures.
“This Platform Key […] is steadily now not changed through OEMs or software distributors, leading to gadgets transport with untrusted keys. An attacker with get admission to to the non-public a part of the PK can simply bypass Safe Boot through manipulating the Key Change Key (KEK) database, the Signature Database (db), and the Forbidden Signature Database (dbx).”
Consequently, PKfail lets in unhealthy actors to run arbitrary code right through the boot procedure, even with Safe Boot enabled, letting them signal malicious code and ship a UEFI bootkit, comparable to BlackLotus.
“The primary firmware prone to PKfail was once launched again in Would possibly 2012, whilst the newest was once launched in June 2024,” Binarly mentioned. “General, this makes this supply-chain factor one of the crucial longest-lasting of its type, spanning over 12 years.”