Vulnerabilities / Threats
01:29 PM

HDTVs Vulnerable To Remote Hackers

Lack of built-in security could allow attackers to introduce malicious JavaScript to networks through Internet-connected sets, warns device security vendor.

40 Tech Gifts For The Holiday Season
(click image for larger view)
Slideshow: 40 Tech Gifts For The Holiday Season

Could high-definition televisions (HDTVs) be the next hack-attack frontier?

Device security vendor Mocana recently tested several brand-name HDTVs that can connect to the Internet, and found that they could be remotely exploited by an attacker, using JavaScript. In particular, the devices failed to verify the integrity or safety of any JavaScript before executing it.

As a result, according to Mocana, "an attacker could intercept transmissions from the television to the network using common rogue DNS, rogue DHCP server, or TCP session hijacking techniques," and tweak them to include malicious JavaScript.

Market researcher DisplaySearch estimates that more than 40 million Internet-accessible TVs will be shipped worldwide in 2010, growing to 118 million by 2014.

According to Adrian Turner, CEO of device security vendor Mocana, "Internet-connected HDTVs are huge sellers this holiday season. But a lot of manufacturers are rushing Internet-connected consumer electronics to market without bothering to secure them." Mocana, not coincidentally, also develops a smart device security platform.

Attacks against HDTVs are entirely hypothetical, and Mocana didn't disclose which particular makes or models of televisions it tested or found flaws in. But potential attacks would include phishing attacks or surreptitiously monitoring users' viewing and Internet habits.

According to Mocana's report, its researchers also recovered third-party keys present on the devices, which were easy to glean since they were transmitted as unencrypted, clear text. The keys are present for providing such services as search, music, photo, and video-related services.

"A big TV manufacturer often purchases high-volume 'special' access privileges to these service provider's networks," according to Mocana. As a result, people could potentially use the keys to access pay-per-view or subscription-based services for free.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
According to industry estimates, about a million new IT security jobs will be created in the next two years but there aren't enough skilled professionals to fill them. On top of that, there isn't necessarily a clear path to a career in security. Dark Reading Executive Editor Kelly Jackson Higgins hosts guests Carson Sweet, co-founder and CTO of CloudPassage, which published a shocking study of the security gap in top US undergrad computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education.