The latest firmware in some Philips smart TV models opens an insecure Miracast wireless network, allowing potential attackers located in the signal range to control the TV remotely and perform unauthorized actions.
Researchers from Malta-based vulnerability research firm ReVuln recently published a video demonstration of what attackers can do after they connect to the insecure wireless networks of the affected Philips TVs. The potential attacks include: accessing the TV's configuration files; accessing files stored on USB devices attached to the TV; broadcasting video, audio and images to the TV; controlling the TVs via an external remote control application and stealing website authentication cookies from the TV's browser.
The insecure network is opened by Miracast, a feature that enables the wireless delivery of audio and video content to the TV screen from desktops, tablets, phones, and other devices.
The Philips TVs running vulnerable firmware versions open a wireless network connection with an identifier that starts with DIRECT-xy and can be accessed with a hard-coded password, the ReVuln security researchers said Friday via email.
"So basically you just connect directly to the TV via WiFi without restrictions," the researchers said. "Miracast is enabled by default and the password cannot be changed. We tried all the possible ways to reset the TV included those methods suggested in the Philips manual [...] but the TV just allows anyone to connect."
The TV doesn't use any additional security measures like generating a unique PIN for each wireless client asking for manual confirmation before authorizing incoming connections.
The problem was likely introduced a few months ago and only exists in newer firmware versions, the ReVuln researchers said. Some models tested in a shop didn't have this issue, but they were running older firmware, they said.
The researchers tested a Philips 55PFL6008S TV, but believe many 2013 models are also affected because they share the same firmware. For example, the 47PFL6158, 55PFL8008 and 84PFL9708 models use all the same firmware although they have different screen sizes, they said.
The insecure wireless access combined with a directory traversal vulnerability in the JointSpace service, which allows external programs to remotely control the TV, allows attackers to extract TV configuration files, media files located on the attached USB devices or authentication cookies for Gmail and other sites from the TV browser.
"The cookies of the Opera browser integrated in the TV and used for all the websites (including the TV apps) are all stored in one file with a fixed path and name, so it's easy to get all of them with one download," the researchers said.
With these cookies, attackers can potentially gain access to the online accounts of the TV owners. However, the success of such attempts depends on the additional security measures of each website.
Sign up for Computerworld eNewsletters.