Saturday, March 2, 2024

Security Vulnerabilities in Sony Smart TVs Expose WiFi Passwords and Stored Images

Security vulnerabilities in Android-based Sony smart TVs allow attackers to access WiFi Passwords and the images stored on the devices.

The vulnerability resides in the Photo Sharing Plus which allows users to upload photos to Sony Smart TV through a smartphone. It affects not only the TV’s used at the home but also the smart TVs used in organizations conference and meeting rooms.

MThese vulnerabilities were uncovered by Darkmatter, it affects multiple Sony Smart TVs including the flagship Bravia line.

CVE-2019-11336 – Information disclosure

The information disclosure vulnerability exists in Sony Smart TV Photo Sharing Plus allows an unauthenticated remote attacker to retrieve plain text wireless password from the “Photo Sharing Plus” API.

Based on the logs, all the passwords have been delivered through plain-text HTTP passwords without authentication.

01-01 07:47:23.730 5539 18687 I System.out: [MEXI][D] HttpEndPoint: send: {“result”:[{“ssid”:”DIRECT-GD-BRAVIA”,”keyType”:””,”key”:”8362tbwX”,”deviceName”:””,”url”:”http:\/\/″,”touchPadRemote”:”notSupported”}],”id”:80}

CVE-2019-10886 – Arbitrary File Read Vulnerability

The vulnerability allows a remote attacker to retrieve images locally stored by the Photo Sharing Plus application without authentication.

“By default, images used by the Photo Sharing Plus application are stored inside ‘/data/user/0/’,” reads security advisory.

Photo Sharing Plusapp “initiates an access point on the television and an HTTP daemon is listening to a TCP port on the newly created WLAN.”

The vulnerabilities allow attackers to read arbitrary files without authentication and to disclose the wireless password.

In order to mitigate the issue, Sony removed the availability of the Photo Sharing Plus service on 2015 – 2016 Android TVs. If you would like to display photos from your mobile devices on your BRAVIA™, we recommend you use the Cast function in Google Photo™. Here you can find the list of affected models.

Related Read

Sony Bravia Smart TV Contains Multiple Critical Vulnerabilities That Allows Attacker Exploit Remotely Without Authentication

North Korean Government Sponsored Hacking Team Member Charged for Wannacry Ransomware and Sony Cyber Attack


Latest articles

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...

BEAST AI Jailbreak Language Models Within 1 Minute With High Accuracy

Malicious hackers sometimes jailbreak language models (LMs) to exploit bugs in the systems so...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles