Subtitles put video player at risk–hacked in translation

Video players are vulnerable. Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles viewed in media players.


Advertising

By crafting malicious subtitle files, which are then downloaded by a victim's media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time and strem.io. Security firm checkpoint estimate there are approximately 200 million video players and streamers that currently run the vulnerable software, making this one of the most widespread, easily accessed and zero-resistance vulnerability reported in recent years. Full details may be read at Check Point's blog post Hacked in Translation – from Subtitles to Complete Takeover.


Advertising

This entry was posted in devices, Security and tagged , , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: Please note the rules for commenting on the blog (first comments and linked posts end up in moderation, I release them every few hours, I rigorously delete SEO posts/SPAM).