Vulnerability Description
The UPnP HTTP server on Sonos wireless speaker products allow unauthorized access via a DNS rebinding attack. This can result in remote device control and privileged device and network information to be exfiltrated by an attacker.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sonos | Sonos Firmware | - |
| Sonos | Sonos | - |
Related Weaknesses (CWE)
References
- https://medium.com/%40brannondorsey/attacking-private-networks-from-the-internet
- https://www.wired.com/story/chromecast-roku-sonos-dns-rebinding-vulnerabilityPress/Media CoverageThird Party Advisory
- https://medium.com/%40brannondorsey/attacking-private-networks-from-the-internet
- https://www.wired.com/story/chromecast-roku-sonos-dns-rebinding-vulnerabilityPress/Media CoverageThird Party Advisory
FAQ
What is CVE-2018-11316?
CVE-2018-11316 is a vulnerability with a CVSS score of 9.6 (CRITICAL). The UPnP HTTP server on Sonos wireless speaker products allow unauthorized access via a DNS rebinding attack. This can result in remote device control and privileged device and network information to ...
How severe is CVE-2018-11316?
CVE-2018-11316 has been rated CRITICAL with a CVSS base score of 9.6/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-11316?
Check the references section above for vendor advisories and patch information. Affected products include: Sonos Sonos Firmware, Sonos Sonos.