CVE-2020-36923
Unknown Unknown - Not Provided
Insecure Direct Object Reference in Sony BRAVIA Digital Signage Allows Unauthorized Access

Publication date: 2026-01-06

Last updated on: 2026-01-06

Assigner: VulnCheck

Description
Sony BRAVIA Digital Signage 1.7.8 contains an insecure direct object reference vulnerability that allows attackers to bypass authorization controls. Attackers can access hidden system resources like '/#/content-creation' by manipulating client-side access restrictions.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-06
Last Modified
2026-01-06
Generated
2026-05-07
AI Q&A
2026-01-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sony bravia_digital_signage to 1.7.8 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2020-36923 is an insecure direct object reference (IDOR) vulnerability in Sony BRAVIA Digital Signage version 1.7.8 and earlier. It allows attackers to bypass client-side authorization controls by manipulating access restrictions on the client side. Specifically, attackers can gain unauthorized access to hidden system resources such as the '/#/content-creation' endpoint, which should normally be protected. [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized attackers to access hidden system resources and potentially sensitive information within the Sony BRAVIA Digital Signage system. This bypass of authorization controls could lead to exposure of internal content management features, which may compromise the security and integrity of the digital signage environment, especially in retail, hospitality, educational, and corporate settings. [2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to access the hidden resource '/#/content-creation' endpoint on the Sony BRAVIA Digital Signage system without proper authorization. You can use HTTP request tools such as curl or wget to test access. For example, a command like `curl -i http://<target-ip>/#/content-creation` can be used to check if the endpoint is accessible without authentication, indicating the presence of the vulnerability. [1, 2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the '/#/content-creation' endpoint by implementing proper server-side authorization checks rather than relying on client-side controls. Additionally, monitor and block unauthorized requests to this endpoint on your network. If possible, update or patch the Sony BRAVIA Digital Signage software to a version where this vulnerability is addressed. Since Sony considered the issue informational and functioning as intended, additional compensating controls such as network segmentation and access control lists should be applied to limit exposure. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart