Article Details
Scrape Timestamp (UTC): 2024-04-09 18:02:12.836
Source: https://www.theregister.com/2024/04/09/lg_tv_critical_bugs/
Original Article Text
Click to Toggle View
Got an unpatched LG 'smart' television? It could be watching you back. Four fatal flaws allow TV takeover. A handful of bugs in LG smart TVs running WebOS could allow an attacker to bypass authorization and gain root access on the device. Once they have gained root, your TV essentially belongs to the intruder who can use that access to do all sorts of nefarious things including moving laterally through your home network, dropping malware, using the device as part of a botnet, spying on you — or at the very least severely screwing up your streaming service algorithms. Bitdefender Labs researcher Alexandru Lazăr spotted the four vulnerabilities that affect WebOS versions 4 through 7. In an analysis published today, the security firm noted that while the vulnerable service is only intended for LAN access, more than 91,000 devices are exposed to the internet, according to a Shodan scan. Here's a look at the four flaws: In order to abuse any of the command injection flaws, however, the attacker must first exploit CVE-2023-6317. This issue is down to WebOS running a service on ports 3000/3001 that allows users to control their TV on their smartphone using a PIN. But, there's a bug in the account handler function that sometimes allows skipping the PIN verification: The function that handles account registration requests uses a variable called skipPrompt which is set to true when either the client-key or the companion-client-key parameters correspond to an existing profile. It also takes into consideration what permissions are requested when deciding whether to prompt the user for a PIN, as confirmation is not required in some cases. After creating an account with no permissions, an attacker can then request a new account with elevated privileges "but we specify the companion-client-key variable to match the key we got when we created the first account," the team reports. The server confirms that the key exists, but doesn't verify which account it belongs to, we're told. "Thus, the skipPrompt variable will be true and the account will be created without requesting a PIN confirmation on the TV," the team reports And then, after creating this account with elevated privileges, an attacker can use that access to exploit the other three flaws that lead to root access or command execution as the dbus user. Lazăr responsibly reported the flaws to LG on November 1, 2023, and LG asked for a time extension to fix them. The electronics giant issued patches on March 22. It's a good idea to check your TV for software updates and apply the WebOS patch now.
Daily Brief Summary
Security vulnerabilities in LG smart TVs running WebOS versions 4 through 7 enable attackers to gain unauthorized root access.
Over 91,000 devices potentially exposed online, allowing remote attackers to execute commands and access TV controls.
Root access facilitates various malicious activities including spying, malware distribution, utilizing TVs in botnets, and tampering with home network security.
The vulnerabilities were initially detected by Bitdefender Labs researcher Alexandru Lazăr, who identified four critical flaws requiring effective patching.
Flaw CVE-2023-6317 allows attackers to bypass PIN verification during account setup on the TV, escalating privileges without owner consent.
LG has issued a software update to patch these vulnerabilities following a delay after researchers disclosed them responsibly.
Users are urged to check their TVs for the latest WebOS updates to ensure protection against potential exploitation of these security gaps.