Subtitles put video player at risk–hacked in translation

Video players are vulnerable. Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles viewed in media players.


Advertising

By crafting malicious subtitle files, which are then downloaded by a victim's media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time and strem.io. Security firm checkpoint estimate there are approximately 200 million video players and streamers that currently run the vulnerable software, making this one of the most widespread, easily accessed and zero-resistance vulnerability reported in recent years. Full details may be read at Check Point's blog post Hacked in Translation – from Subtitles to Complete Takeover.


Cookies helps to fund this blog: Cookie settings
Advertising


This entry was posted in devices, Security and tagged , , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *