pinit_fg_en_rect_red_20 GEN - Remote Attack Flaw Found In IPTV Streaming Service
north-korea-debuts-new-electricfish-malw-5cd943e5e2c92200c2610f9d-1-may-15-2019-11-18-12-poster GEN - Remote Attack Flaw Found In IPTV Streaming Service
New North Korea-linked malware strain puts FBI and DHS under alertElectricfish malware is used to forge covert pathways out of infected Windows PCs.north-korea-debuts-new-electricfish-malw-5cd943e5e2c92200c2610f9d-1-may-15-2019-11-18-12-poster GEN - Remote Attack Flaw Found In IPTV Streaming Service

A critical remote execution flaw has been found in a Ukrainian TV streaming device manufacturer which, if exploited, granted attackers the power to seize control of the streaming service and content on display.

According to Check Point Research, Infomir -- a Ukrainian IPTV (Internet Protocol Television), OTT (Over-the-Top) and VoD (Video-on Demand) content streaming provider was the source of the security flaw.

Security

  • Google Cloud goes down, taking YouTube, Gmail, Snapchat, and others with it
  • New attack creates ghost taps on modern Android smartphones
  • Cybersecurity: The number of files exposed on misconfigured servers, storage and cloud services has risen to 2.3 billion
  • Checkers restaurant chain discloses card breach

On Wednesday, researchers said in a blog post that Infomir's web management platform, Ministra -- also known as Stalker -- is used to manage set-top boxes (STBs). The platform acts as a conduit between consumer STBs and television service providers which buy into the platform.

See also: BlackSquid malware uses bag of exploits to drop cryptocurrency miners

Ministra does require authentication to access -- but a logic problem ballooned into a major security vulnerability which removed this protection.

The team was able to circumvent the demand for authentication and seize control of some admin AJAX API functions due to a sanitization key failure, leading to the potential for SQL and PHP Object injection and the remote execution of code.

TechRepublic: How to protect your customers' personal identifiable information

Check Point says that it is difficult to estimate the full impact of the security flaw, but as over 1000 content providers and resellers are connected to Ministra, there would likely be a "very high" number of worldwide customers which may have been impacted.

"In order to receive the television broadcast, the STB connects to the Ministra and service providers use the Ministra platform to manage their clients," the researchers say. "The risks would be their entire customer database of personal information and financial details could be stolen, as well as allowing an attacker to potentially stream any content they choose on to the screens of their customer network."

CNET: Amazon's helping police build a surveillance network with Ring doorbells

The vulnerability was first discovered and reported in 2018 and was patched prior to public disclosure in Ministra version 5.4.1. However, as some service providers may not have applied the fix, the vulnerability has also been reported to the CTA Forum.

Europol’s top hacking ring takedownsSEE FULL GALLERY
screenshot-2019-06-05-at-13-32-19 GEN - Remote Attack Flaw Found In IPTV Streaming Service
screenshot-2019-06-05-at-13-33-43 GEN - Remote Attack Flaw Found In IPTV Streaming Service
screenshot-2019-06-05-at-13-36-55 GEN - Remote Attack Flaw Found In IPTV Streaming Service
screenshot-2019-06-05-at-13-34-32 GEN - Remote Attack Flaw Found In IPTV Streaming Service
screenshot-2019-06-05-at-13-37-52 GEN - Remote Attack Flaw Found In IPTV Streaming Service
wAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw== GEN - Remote Attack Flaw Found In IPTV Streaming Service
wAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw== GEN - Remote Attack Flaw Found In IPTV Streaming Service
1 - 5 of 7
NEXT PREV

Previous and related coverage

  • This is how hackers make money from your stolen medical data
  • Malboard: Hackers can now pose as victims through their keyboards
  • US to demand five years of your social media, email account info in visa application

Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0