Flawed EZCast Media Streamer

By   ISBuzz Team
Writer , Information Security Buzz | Jan 11, 2016 09:00 pm PST

Graham Cluley is reporting that researchers have uncovered two critical vulnerabilities in the TV-streaming EZCast device that can lead to remote code execution, and point to more general weaknesses in Internet of Things (IoT) security.

EZCast is an HDMI dongle-based TV streamer that is both remote-free and cross-platform (running on Android, iOS, Mac, and Windows). The device enables a user to stream media content from the web or their mobile device onto a television. Travis Smith, senior security research engineer at Tripwire explains:

[su_note note_color=”#ffffcc” text_color=”#00000″]Travis Smith, Senior Security Research Engineer for Tripwire :

“Consumers are not quite aware of the implications of allowing root access to a device on their own network. Not until they feel a real impact to their daily lives will the typical consumer demand with their dollars that security is not only important, but essential.

When you combine low profit margins and competitive time to market, sacrifices are made to ship a minimum viable product. More often than not, security being built in from the beginning is one of the sacrifices made by many vendors. The costs associated with building and maintaining adequate security will reduce profits and/or increase the price of the product to the consumer, neither of which are ideal in a competitive IoT landscape.”[/su_note]

[su_box title=”About Tripwire” style=”noise” box_color=”#336588″]Tripwire logoTripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence.[/su_box]