CVE-2020-9285

Some versions of Sonos One (1st and 2nd generation) allow partial or full memory access via attacker controlled hardware that can be attached to the Mini-PCI Express slot on the motherboard that hosts the WiFi card on the device.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sonos:one_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sonos:one:-:*:*:*:*:*:*:*

History

08 May 2025, 18:15

Type Values Removed Values Added
CWE CWE-1191

21 Nov 2024, 05:40

Type Values Removed Values Added
References () https://tnpitsecurity.com/blog/gaining-root-on-sonos-speakers/ - Exploit, Third Party Advisory () https://tnpitsecurity.com/blog/gaining-root-on-sonos-speakers/ - Exploit, Third Party Advisory

Information

Published : 2022-10-20 17:15

Updated : 2025-05-08 18:15


NVD link : CVE-2020-9285

Mitre link : CVE-2020-9285

CVE.ORG link : CVE-2020-9285


JSON object : View

Products Affected

sonos

  • one
  • one_firmware
CWE
NVD-CWE-noinfo CWE-1191

On-Chip Debug and Test Interface With Improper Access Control