CVE-2018-11316

The UPnP HTTP server on Sonos wireless speaker products allow unauthorized access via a DNS rebinding attack. This can result in remote device control and privileged device and network information to be exfiltrated by an attacker.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sonos:sonos_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sonos:sonos:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:43

Type Values Removed Values Added
References () https://medium.com/%40brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325 - () https://medium.com/%40brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325 -
References () https://www.wired.com/story/chromecast-roku-sonos-dns-rebinding-vulnerability - Press/Media Coverage, Third Party Advisory () https://www.wired.com/story/chromecast-roku-sonos-dns-rebinding-vulnerability - Press/Media Coverage, Third Party Advisory

Information

Published : 2018-07-03 16:29

Updated : 2024-11-21 03:43


NVD link : CVE-2018-11316

Mitre link : CVE-2018-11316

CVE.ORG link : CVE-2018-11316


JSON object : View

Products Affected

sonos

  • sonos_firmware
  • sonos
CWE
CWE-20

Improper Input Validation