Vulnerabilities / Threats
12/17/2010
01:29 PM
50%
50%

HDTVs Vulnerable To Remote Hackers

Lack of built-in security could allow attackers to introduce malicious JavaScript to networks through Internet-connected sets, warns device security vendor.

40 Tech Gifts For The Holiday Season
(click image for larger view)
Slideshow: 40 Tech Gifts For The Holiday Season

Could high-definition televisions (HDTVs) be the next hack-attack frontier?

Device security vendor Mocana recently tested several brand-name HDTVs that can connect to the Internet, and found that they could be remotely exploited by an attacker, using JavaScript. In particular, the devices failed to verify the integrity or safety of any JavaScript before executing it.

As a result, according to Mocana, "an attacker could intercept transmissions from the television to the network using common rogue DNS, rogue DHCP server, or TCP session hijacking techniques," and tweak them to include malicious JavaScript.

Market researcher DisplaySearch estimates that more than 40 million Internet-accessible TVs will be shipped worldwide in 2010, growing to 118 million by 2014.

According to Adrian Turner, CEO of device security vendor Mocana, "Internet-connected HDTVs are huge sellers this holiday season. But a lot of manufacturers are rushing Internet-connected consumer electronics to market without bothering to secure them." Mocana, not coincidentally, also develops a smart device security platform.

Attacks against HDTVs are entirely hypothetical, and Mocana didn't disclose which particular makes or models of televisions it tested or found flaws in. But potential attacks would include phishing attacks or surreptitiously monitoring users' viewing and Internet habits.

According to Mocana's report, its researchers also recovered third-party keys present on the devices, which were easy to glean since they were transmitted as unencrypted, clear text. The keys are present for providing such services as search, music, photo, and video-related services.

"A big TV manufacturer often purchases high-volume 'special' access privileges to these service provider's networks," according to Mocana. As a result, people could potentially use the keys to access pay-per-view or subscription-based services for free.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He keeps trolling Tumblr by posting 'Yes, this is dog.'"
Current Issue
Understanding & Managing the Mobile Security Threat
Mobile devices are increasing IT security risk. Is your enterprise ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join us as Dark Reading editors speak with IT security hiring experts about improving IT career prospects.