• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Philips smart TV wireless network vulnerable to attacks

Updated on Mar 31, 2014 by Guest Authors

Cyber criminals have found another technique to wreak havoc on online users by remotely controlling some Philips smart TV models that researchers say contain firmware which opens the Miracast wireless network to vulnerabilities.

The vulnerability was first spotted in September of 2013 but apparently Philips ignored the red flags and failed to work on some fixes so the latest firmware of its smart TVs has been consequently infected.

According to security analysts from ReVuln, which first discovered the loophole in Philips smart TVs, attackers worked their way around accessing the wireless network of the affected TV sets. Then they can perform various malicious activities such as viewing and possibly exploiting the configuration settings, contents stored within a removable drive connected to the TV, inserting video and audio files to the TV and swipe authentication cookies of millions of websites stored in the TV’s browser.

In particular, the Opera browser’s cookies contained in the TV is easily exposed to attackers for the taking because it is stored in a single file that has been created with only one path and name. A no-brainer for criminals.

philips-attack

What makes the Philips smart TV vulnerable is the lax security infrastructure embedded in the device, which lacks the mechanism for a unique password creation each time a new client sends a request to connect to the wireless network. Basically, there is no way the administrator can confirm the request and an outsider can automatically connect to it.

Early this month, security researchers also detected a compromise in routers used at home and in offices. The bug was built to change configurations of more than 300,000 routers, including such brands as D-Link, Micronet, and TP-Link.

The affected Philips smart TV models were manufactured in 2014 but also some that were produced last year are believed to be possessing this vulnerability to such kinds of attacks.

What exactly are the risks? Well, malicious parties can access your online accounts such as email, credit card numbers and other valuable assets in the cyberspace, especially if the security measures of each website have not been bolstered yet. So it really depends on a certain website how far the impact on you as a user this risk can do.

But a mere fix alone is not enough to address the insecurity in the Miracast wireless network. The network will still be susceptible to other forms of attacks such as the unauthorized transmission of video and audio to the TV from remote servers or via a third party application. 

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

VTOMAN FlashSpeed 1500 Portable Power Station Review

OpenRock S Review – Revolutionizing the World of Earbuds

KEF LS50 Bookshelf Speakers Review: A Sound Decision Over the LS50 Meta

ALLPOWERS SP033 200W Portable Solar Panel Review – Eco-Friendly Energy on the Go

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • VTOMAN FlashSpeed 1500 Portable Power Station Review
  • OpenRock S Review – Revolutionizing the World of Earbuds
  • AiDot OREiN & Linkind Matter Smart Light Bulb Review
  • OKP L1 Robot Vacuum Cleaner Review – Affordable Robot with LiDAR Navigation

Copyright © 2023 · All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}