Attackers can abuse security gaps in Sonos speaker systems to admit malicious code and carry out on the speakers. Updates are ready.
It is about a total of three security gaps, for which the Zero-Day initiative (ZDI) from Trend Micro has now published information together with Sonos. All three vulnerabilities miss the classification as a critical security risk and can only be used extremely and can be used without prior registration.
Sonos: Three high -risk security gaps
The first of the security leaks now reported goes back to a lack of examination in the processing of SMB data (i.e. from Windows network releases), whether an object exists before the Sonos software carries out operations on it (CVE 2025-1048CVSS 8.8Risk “high“). Somewhat unexpected is a safety-relevant problem in processing ID3 tags, such as those contained.CVE 2025-1049CVSS 8.8Risk “high“).
The situation is similar in the processing of HLS playlist data. Here, too, a proper check of the length of user handed down data is missing, which enables writing access behind the end of an allocated data structure – the user “Anacapa” can be involuntarily brought to the execution of smuggled harmful code (CVE-2025-1050CVSS 8.8Risk “high“).
The ZDI’s weaknesses describe the gaps for the Sonos ERA-300 systems. One now publicly accessible security notification from Sonos However, explains that all Sonos S1 and S2 systems, and here more precise system releases before V16.6 (Build 83.1-61240) and Sonos S1 system releases V11.15.1 (Build 57.22-61162) are susceptible. Accordingly, vulnerabilities that were uncovered in Ireland as part of the 2024 PWN2own event. One Instructions from Sonos discusses how users can install the updates that are available.
Last year Sonos had to struggle with a failed start of the new Sonos app. A seven-point measures catalog should help improve processes and to regain the trust of the community.
Discover more from Apple News
Subscribe to get the latest posts sent to your email.