Vulnerabilities / Threats
12/17/2010
01:29 PM
50%
50%

HDTVs Vulnerable To Remote Hackers

Lack of built-in security could allow attackers to introduce malicious JavaScript to networks through Internet-connected sets, warns device security vendor.

40 Tech Gifts For The Holiday Season
(click image for larger view)
Slideshow: 40 Tech Gifts For The Holiday Season

Could high-definition televisions (HDTVs) be the next hack-attack frontier?

Device security vendor Mocana recently tested several brand-name HDTVs that can connect to the Internet, and found that they could be remotely exploited by an attacker, using JavaScript. In particular, the devices failed to verify the integrity or safety of any JavaScript before executing it.

As a result, according to Mocana, "an attacker could intercept transmissions from the television to the network using common rogue DNS, rogue DHCP server, or TCP session hijacking techniques," and tweak them to include malicious JavaScript.

Market researcher DisplaySearch estimates that more than 40 million Internet-accessible TVs will be shipped worldwide in 2010, growing to 118 million by 2014.

According to Adrian Turner, CEO of device security vendor Mocana, "Internet-connected HDTVs are huge sellers this holiday season. But a lot of manufacturers are rushing Internet-connected consumer electronics to market without bothering to secure them." Mocana, not coincidentally, also develops a smart device security platform.

Attacks against HDTVs are entirely hypothetical, and Mocana didn't disclose which particular makes or models of televisions it tested or found flaws in. But potential attacks would include phishing attacks or surreptitiously monitoring users' viewing and Internet habits.

According to Mocana's report, its researchers also recovered third-party keys present on the devices, which were easy to glean since they were transmitted as unencrypted, clear text. The keys are present for providing such services as search, music, photo, and video-related services.

"A big TV manufacturer often purchases high-volume 'special' access privileges to these service provider's networks," according to Mocana. As a result, people could potentially use the keys to access pay-per-view or subscription-based services for free.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4293
Published: 2015-07-30
The packet-reassembly implementation in Cisco IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (CPU consumption or packet loss) via fragmented (1) IPv4 or (2) IPv6 packets that trigger ATTN-3-SYNC_TIMEOUT errors after reassembly failures, aka Bug ID CSCuo37957.

CVE-2014-7912
Published: 2015-07-29
The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory c...

CVE-2014-7913
Published: 2015-07-29
The print_option function in dhcp-common.c in dhcpcd through 6.9.1, as used in dhcp.c in dhcpcd 5.x in Android before 5.1 and other products, misinterprets the return value of the snprintf function, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corru...

CVE-2015-2977
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via unspecified vectors.

CVE-2015-2978
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to bypass authentication and complete a conference-room reservation via unspecified vectors, as demonstrated by an "unintentional reservation."

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!