CVE-2020-36923
Published: 06 January 2026
Description
Sony BRAVIA Digital Signage 1.7.8 contains an insecure direct object reference vulnerability that allows attackers to bypass authorization controls. Attackers can access hidden system resources like '/#/content-creation' by manipulating client-side access restrictions.
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for access to system resources, directly preventing IDOR bypasses of client-side restrictions via server-side checks.
Protects publicly accessible interfaces from unauthorized use, mitigating network-exploitable unauthenticated access to hidden resources like '/#/content-creation'.
Validates manipulated inputs such as object references, reducing the risk of insecure direct object reference exploitation.
Security SummaryAI
CVE-2020-36923 is an insecure direct object reference vulnerability (CWE-639) in Sony BRAVIA Digital Signage version 1.7.8. The flaw enables attackers to bypass authorization controls by manipulating client-side access restrictions, allowing unauthorized access to hidden system resources such as '/#/content-creation'.
With a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), the vulnerability is exploitable over the network by unauthenticated attackers requiring low complexity and no user interaction. Exploitation can result in high impacts to confidentiality, integrity, and availability, as attackers gain access to restricted system resources.
Advisories and related resources for mitigation details are available at the following references: https://cxsecurity.com/issue/WLB-2020120031, https://exchange.xforce.ibmcloud.com/vulnerabilities/192607, https://packetstormsecurity.com/files/160344, https://pro-bravia.sony.net, and https://pro-bravia.sony.net/resources/software/bravia-signage/.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The IDOR vulnerability in the Sony BRAVIA Digital Signage web interface allows unauthenticated remote attackers to bypass authorization and access hidden system resources, directly mapping to exploitation of a public-facing application.