CVE-2020-36923
Insecure Direct Object Reference in Sony BRAVIA Digital Signage Allows Unauthorized Access
Publication date: 2026-01-06
Last updated on: 2026-01-06
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sony | bravia_digital_signage | to 1.7.8 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2020-36923 is an insecure direct object reference (IDOR) vulnerability in Sony BRAVIA Digital Signage version 1.7.8 and earlier. It allows attackers to bypass client-side authorization controls by manipulating access restrictions on the client side. Specifically, attackers can gain unauthorized access to hidden system resources such as the '/#/content-creation' endpoint, which should normally be protected. [1, 2, 3]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing unauthorized attackers to access hidden system resources and potentially sensitive information within the Sony BRAVIA Digital Signage system. This bypass of authorization controls could lead to exposure of internal content management features, which may compromise the security and integrity of the digital signage environment, especially in retail, hospitality, educational, and corporate settings. [2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to access the hidden resource '/#/content-creation' endpoint on the Sony BRAVIA Digital Signage system without proper authorization. You can use HTTP request tools such as curl or wget to test access. For example, a command like `curl -i http://<target-ip>/#/content-creation` can be used to check if the endpoint is accessible without authentication, indicating the presence of the vulnerability. [1, 2, 3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the '/#/content-creation' endpoint by implementing proper server-side authorization checks rather than relying on client-side controls. Additionally, monitor and block unauthorized requests to this endpoint on your network. If possible, update or patch the Sony BRAVIA Digital Signage software to a version where this vulnerability is addressed. Since Sony considered the issue informational and functioning as intended, additional compensating controls such as network segmentation and access control lists should be applied to limit exposure. [1, 2]