Skip to content

yunuscadirci/DIALStranger

Repository files navigation

DIALStranger

What is DIAL?

Discovery and Launch (DIAL) is a protocol co-developed by Netflix and YouTube with help from Sony and Samsung. It is used for videos to be played on TVs and other devices easily.

image

http://www.dial-multiscreen.org/dial-protocol-specification

What is vulnerability?

This is a research from 2019. I found protocol doesn't cover some basic security features and most of TV vendors didnt implement protocol correctly. Hackers can play any video on the TVs with or without user interaction. You can find details on [2019 original research](DIAL Protocol Vulnerabilities and Implementation Errors - 2019.pdf and Blackhat MEA 2023 presentation .

https://github.com/yunuscadirci/DIALStranger/blob/main/DIALStranger_lg_demo.mp4

Why waited 4 years

Because of nature of protocol vulnerabilities - we saw for CallStranger CVE-2020-12695 - it takes forever to patch all the systems. I think waiting 4 years is enough for this vulnerability

Are we secure now?

We are better than 2019 because:

  • Netflix updated protocol 2020 and covered some holes.
  • Responsible vendors updated devices.
  • Browsers disabled FTP, WebRTC local IP disclosure. These were used for finding and exploiting local devices

We are not fully secure because

  • Old TVs are not updated and will not be updated
  • Even we dont know local IP, we can spray with ajax

DIAL is a local protocol

Absolutely no. Milions of TV's are open to Internet and by the nature of protocol, those TV's can be exploited by the hackers. They can be used for propaganda and profit

Tools

DIAL Scanner

Under this repository, you can find DIALScanner solution. It sends M-SEARCH SSDP Request and DIAL devices answer. Also it automatically creates a test URL

image

DIAL CORS Tester

You can visit http://tester.dialstranger.com/DialStranger.html (dont use https) to test against DIAL CORS vulnerabilities. It has some presets for port and URI. If you dont know your DIAL ports and URI, use DIAL Scanner to find

DIAL Port and Endpoints

Please share your screenshot to make this list richer

Vendor Port URI
LG 36866 /apps/
Xbox 10247 /apps/
PS5 54932 /apps/
Xiomi Mibox4 8008 /apps/
Hisense 65A6100EX 56789 /apps/
Philips 56789 /apps/
Vestel 56791 /apps/
Samsung 8001 /ws/apps/
Freebox Player 8100 /apps/

About

details about DIAL protocol vulnerabilities

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages