TLDR:
Key Points:
- Sonos smart speakers were found to have vulnerabilities that could allow remote attackers to eavesdrop on users.
- The vulnerabilities were presented at Black Hat USA 2024 and impact all versions prior to Sonos S2 release 15.9 and Sonos S1 release 11.12.
Article:
Cybersecurity researchers have identified vulnerabilities in Sonos smart speakers that could be exploited by malicious actors to secretly listen in on users. The flaws, described as weaknesses in the secure boot process of Sonos devices, could allow remote attackers to compromise the devices over the air, potentially leading to covert audio capture. The vulnerabilities impact all versions prior to Sonos S2 release 15.9 and Sonos S1 release 11.12, which were shipped in October and November 2023. CVE-2023-50809 and CVE-2023-50810 were the specific vulnerabilities identified, with the former allowing for remote code execution and the latter enabling persistent arbitrary code execution. NCC Group, the researchers responsible for uncovering the flaws, emphasized the importance of stringent security standards for OEM components and thorough validation of all attack surfaces to prevent such vulnerabilities.
The disclosure of Sonos speaker vulnerabilities coincides with Binarly’s revelation of a critical firmware supply chain issue known as PKfail, affecting UEFI products from various vendors. The PKfail flaw can be exploited to bypass Secure Boot and install malware, highlighting the ongoing challenges in ensuring firmware security across diverse products. Overall, the findings serve as a reminder of the need for robust security measures in IoT devices to safeguard user privacy and prevent unauthorized access.