{"id":5228,"date":"2014-04-04T10:00:59","date_gmt":"2014-04-04T14:00:59","guid":{"rendered":"http:\/\/blog.nccomputertech.com\/?p=5228"},"modified":"2014-04-04T10:00:59","modified_gmt":"2014-04-04T14:00:59","slug":"philips-smart-tvs-open-to-wireless-attacks-researchers-say","status":"publish","type":"post","link":"https:\/\/nccomputertech.com\/techtalk\/2014\/04\/04\/philips-smart-tvs-open-to-wireless-attacks-researchers-say\/","title":{"rendered":"Philips smart TVs open to wireless attacks, researchers say"},"content":{"rendered":"<p style=\"text-align:center;\"><a href=\"http:\/\/www.pcworld.com\/article\/2137520\/philips-smart-tvs-open-to-remote-attacks-via-default-wireless-connection-researchers-say.html\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nccomputertech.com\/techtalk\/wp-content\/uploads\/2014\/03\/hdtv_on_wall-100119093-large.jpg\" alt=\"\" \/><\/a><\/p>\n<p>The latest firmware in some Philips smart TV models opens an insecure Miracast wireless network, allowing potential attackers located in the signal range to control the TV remotely and perform unauthorized actions.<\/p>\n<p>Researchers from Malta-based vulnerability research firm ReVuln recently published a video demonstration of what attackers can do after they connect to the insecure wireless networks of the affected Philips TVs. The potential attacks include: accessing the TV\u2019s configuration files; accessing files stored on USB devices attached to the TV; broadcasting video, audio and images to the TV; controlling the TVs via an external remote control application and stealing website authentication cookies from the TV\u2019s browser.<\/p>\n<p>The insecure network is opened by Miracast, a feature that enables the wireless delivery of audio and video content to the TV screen from desktops, tablets, phones, and other devices.<\/p>\n<p>The Philips TVs running vulnerable firmware versions open a wireless network connection with an identifier that starts with DIRECT-xy and can be accessed with a hard-coded password, the ReVuln security researchers said Friday via email.<\/p>\n<p>\u201cSo basically you just connect directly to the TV via WiFi without restrictions,\u201d the researchers said. \u201cMiracast is enabled by default and the password cannot be changed. We tried all the possible ways to reset the TV included those methods suggested in the Philips manual [&#8230;] but the TV just allows anyone to connect.\u201d<\/p>\n<p>The TV doesn\u2019t use any additional security measures like generating a unique PIN for each wireless client asking for manual confirmation before authorizing incoming connections.<\/p>\n<p>The problem was likely introduced a few months ago and only exists in newer firmware versions, the ReVuln researchers said. Some models tested in a shop didn\u2019t have this issue, but they were running older firmware, they said.<\/p>\n<p>The researchers tested a Philips 55PFL6008S TV, but believe many 2013 models are also affected because they share the same firmware. For example, the 47PFL6158, 55PFL8008 and 84PFL9708 models use all the same firmware although they have different screen sizes, they said.<\/p>\n<p>The insecure wireless access combined with a directory traversal vulnerability in the JointSpace service, which allows external programs to remotely control the TV, allows attackers to extract TV configuration files, media files located on the attached USB devices or authentication cookies for Gmail and other sites from the TV browser.<\/p>\n<p>\u201cThe cookies of the Opera browser integrated in the TV and used for all the websites (including the TV apps) are all stored in one file with a fixed path and name, so it\u2019s easy to get all of them with one download,\u201d the researchers said.<\/p>\n<p>With these cookies, attackers can potentially gain access to the online accounts of the TV owners. However, the success of such attempts depends on the additional security measures of each website.<\/p>\n<p>The directory traversal vulnerability in JointSpace was publicly disclosed in September by researchers from a Berlin-based security consultancy firm called Schobert IT-Security Consulting. The flaw doesn\u2019t appear to have been fixed by Philips and still exists in the latest firmware version\u2014173.46, according to the ReVuln researchers.<\/p>\n<p>However, even if this vulnerability is patched, the insecure Miracast wireless network still enables other attacks, like transmitting attacker-controlled video and audio content to the TV or remotely controlling the TV through an external application.<\/p>\n<p>\u201cWe recognize the security issue as reported by ReVuln linked to Miracast on the high-end 2013 Philips Smart TVs,\u201d said Eva Heller, head of global communications at TP Vision, a joint venture between Philips and TPV Technology that manufactures and sells Philips-branded TVs, in an emailed statement. \u201cOur experts are looking into this and are working on a fix.\u201d<\/p>\n<p>TP recommends that, in the meantime, consumers switch off the Wi-Fi Miracast function of the TV. To do this, they need to press the HOME button, navigate to Setup, select Network Settings, navigate to Wi-Fi Miracast and set that to OFF.<\/p>\n<p>via <a href=\"http:\/\/www.pcworld.com\/article\/2137520\/philips-smart-tvs-open-to-remote-attacks-via-default-wireless-connection-researchers-say.html\" target=\"_blank\">Philips smart TVs open to wireless attacks, researchers say | PCWorld<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The latest firmware in some Philips smart TV models opens an insecure Miracast wireless network, allowing potential attackers located in [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[7,10],"tags":[373,820,1177],"class_list":["post-5228","post","type-post","status-publish","format-standard","hentry","category-security","category-technology","tag-firmware","tag-phillips-smart-tv","tag-vulnerabilities"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/papNkV-1mk","jetpack-related-posts":[{"id":9378,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/07\/13\/smart-home-security-tips\/","url_meta":{"origin":5228,"position":0},"title":"Smart Home Security Tips","author":"NCCT","date":"July 13, 2018","format":false,"excerpt":"https:\/\/youtu.be\/ESqqAf3IGok Megan Morrone and Florence Ion talk to Stacey Higginbotham about tips for securing your smart home. The advantages and disadvantages of running devices on a guest network. Plus, how do you know if your devices are getting regular firmware updates.","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"https:\/\/nccomputertech.com\/techtalk\/category\/networking\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ESqqAf3IGok\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9509,"url":"https:\/\/nccomputertech.com\/techtalk\/2019\/01\/13\/safe-bladder-space-this-week-in-tech-701\/","url_meta":{"origin":5228,"position":1},"title":"Safe Bladder Space &#8211; This Week in Tech 701","author":"NCCT","date":"January 13, 2019","format":false,"excerpt":"https:\/\/youtu.be\/AzElk_tBdEg Our Favorite Things at CES 2019 All of our favourite products and trends at CES 2019! -- Impossible Burger -- Health and wearables -- Amazon vs Google -- Smart products and \"Smart\" products -- Laptops -- 5G -- Wireless power -- Toilet tech and ultrasonic bladder monitoring Host: Leo\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/nccomputertech.com\/techtalk\/category\/technology\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/AzElk_tBdEg\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9910,"url":"https:\/\/nccomputertech.com\/techtalk\/2025\/02\/11\/slap-and-flop-siri-ios-18-3-update-apple-music\/","url_meta":{"origin":5228,"position":2},"title":"Slap and Flop &#8211; Siri, iOS 18.3 Update, Apple Music","author":"NCCT","date":"February 11, 2025","format":false,"excerpt":"https:\/\/youtu.be\/Xwqi58VczQ4 What's going on with Siri? iOS 18.3 update is out now, along with a fix to a zero-day flaw. You can buy iPhones on eBay with TikTok installed on them as TikTok is still not available for download on the App Store. And on January 27th, 2010, Steve Jobs\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/Xwqi58VczQ4\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9393,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/08\/19\/this-week-in-tech-680-hacky-hack-hack\/","url_meta":{"origin":5228,"position":3},"title":"This Week in Tech 680: Hacky Hack Hack","author":"NCCT","date":"August 19, 2018","format":false,"excerpt":"https:\/\/youtu.be\/7ClMz3MkTJk This Week in Tech Elon's Twitter addiction, $1200 iPhone XS+, Movie Pass Fail, Pai's lie, and more. --Leave Elon alone! Tesla tumbles after Musk laments his \"most difficult and painful year.\" --Google employees revolt over China rumors; town hall meeting shut down due to \"kerfuffle\" tweets. --Apple thinks that\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/nccomputertech.com\/techtalk\/category\/technology\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/7ClMz3MkTJk\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9655,"url":"https:\/\/nccomputertech.com\/techtalk\/2021\/03\/09\/fuquay-varina-and-holly-springs-computer-repair\/","url_meta":{"origin":5228,"position":4},"title":"Fuquay Varina and Holly Springs Computer Repair","author":"NCCT","date":"March 9, 2021","format":false,"excerpt":"Welcome to our blog. NC Computer Tech services Fuquay Varina, Holly Springs, and surrounding NC areas. We offer prompt, professional, courteous service with over twenty years of experience dealing with residential and small business clients offering them solutions and fixing their computer and network issues at reasonable rates. Our services\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/nccomputertech.com\/techtalk\/category\/technology\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9908,"url":"https:\/\/nccomputertech.com\/techtalk\/2025\/02\/11\/fake-frames-tested-dlss-4-0-mfg-4x-nvidias-misleading-review-guide\/","url_meta":{"origin":5228,"position":5},"title":"&#8220;Fake Frames&#8221; Tested | DLSS 4.0, MFG 4X, &#038; NVIDIA&#8217;s Misleading Review Guide","author":"NCCT","date":"February 11, 2025","format":false,"excerpt":"https:\/\/youtu.be\/Nh1FHR9fkJk We talk about NVIDIA's DLSS 4.0 multi-frame generation (MFG), NVIDIA's weird decisions on testing tools, differences in transformer vs. CNN (convolutional neural network) models, benchmark performance, and generated frames. Frame generation commonly gets referred to as \"artificial\" frames, \"generated\" frames, or commonly online, \"fake frames.\" This video delves into\u2026","rel":"","context":"In &quot;Hardware&quot;","block_context":{"text":"Hardware","link":"https:\/\/nccomputertech.com\/techtalk\/category\/hardware\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/Nh1FHR9fkJk\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/5228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/comments?post=5228"}],"version-history":[{"count":0,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/5228\/revisions"}],"wp:attachment":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/media?parent=5228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/categories?post=5228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/tags?post=5228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}