SlideShare a Scribd company logo
What the HEC? Security implications of
HDMI Ethernet Channel and other related
protocols
Andy Davis, Research Director NCC Group
UK Offices                North American Offices   Australian Offices
Manchester - Head Office   San Francisco            Sydney
Cheltenham                Atlanta
Edinburgh                 New York
Leatherhead               Seattle
London
Thame


European Offices
Amsterdam - Netherlands
Munich – Germany
Zurich - Switzerland
Agenda

• Why am I talking about video interfaces?
• What does HDMI bring with it?
• The CEC protocol – enabling the user to expend as little energy as possible
• CECSTeR – The CEC Security Testing Resource
• The HEC protocol – you mean I get network access too?
• HEC internals and potential security issues
• Conclusion
Why am I talking about video interfaces?

• It all started with a BlackBerry PlayBook research project…
• I was investigating USB security at the time (green interface)




• What other ports are available?
• A power connector (blue interface) – probably not that exciting…
• Hmm…microHDMI – what can I do with that? (red interface)
HDMI is an output isn’t it?

Well…yes and no


• Video out
• Audio out
• Display identification and capability advertisement in via EDID
• Remote control via CEC in and out
• Network data via HEC in and out
• Encryption and authentication data via HDCP and DPCP in and out
HDMI - High-Definition Multimedia Interface

• http://www.hdmi.org/manufacturer/specification.aspx (HDMI adopters only)
• Transmits encrypted uncompressed digital video and audio data using
  TMDS (Transition-Minimised Differential Signalling)
• Supports Enhanced DDC for display identification and capability
  advertisement
• Also it introduces a number of new technologies, which are potentially
  interesting from a security perspective; these include:
     • CEC – Consumer Electronics Control
     • CDC – Capability Discovery and Control
     • HDCP - High-bandwidth Digital Content Protection
     • HEC – HDMI Ethernet Channel
CEC – I’ve not heard of that before…

Trade names for CEC are:


• BRAVIA Link and BRAVIA Sync (Sony)
• VIERA Link , HDAVI Control, EZ-Sync (Panasonic)
• Anynet+ (Samsung)
• Aquos Link (Sharp)
• SimpLink (LG)
• EasyLink (Philips)
etc…
CEC - Consumer Electronics Control

Purpose:
• Control two or more HDMI devices using a single remote control
• Devices can control each other without user-intervention.


Physical:
• The architecture of CEC is an inverted tree
• One-wire bidirectional serial bus (AV.link)


Logical:
• Up to ten AV devices can be connected and the topology of a connected system is
  auto-discovered by the protocol.
Supported CEC commands
• One Touch Play, System Standby
• Pre-set Transfer, One Touch Record
• Timer Programming, System Information
• Deck Control , Tuner Control
• OSD Display, Device Menu Control
• Routing Control, Remote Control Pass
• Device OSD Name Transfer, System Audio Control
The CEC protocol

CEC Block layout:



CEC Header block:


CEC Message:


• Messages are either Directed or Broadcast
• Logical addresses are 0x0 – 0xF (0 always TV, F always broadcast)
• Physical addresses x.x.x.x (TV = 0.0.0.0)
Can we fuzz CEC?

• Feature rich protocol - could potentially yield some interesting security
  vulnerabilities in different implementations
• Arduino library - http://code.google.com/p/cec-arduino/
• Publicly available Arduino - CEC interface circuit:


• USB-CEC Adapter from Pulse Eight:




• USB-CEC Bridge from RainShadow Tech:
Introducing CECSTeR

• Consumer Electronics Control Security Testing Resource
• Download it here - http://tinyurl.com/ncctools
• Supports CEC and CDC (more on that later)
• Capture and display traffic
• Send arbitrary commands
• Fuzz the protocols
• Time for a demo…
HDMI Connectivity for the demo
What are the fuzzer results?

My CEC targets:
• Sony PS3 – no results
• Panasonic Blu-ray player (DMP-BD45) – “random” lockups
• BlackBerry PlayBook (very limited CEC functionality) - no results
• XBMC (using Pulse-eight USB-CEC Adapter) – Permanent DoS
     • It “bricked” the Pulse-eight adapter!
• Potentially interesting commands include:
     • “Vendor command” – Opcode 0x89
     • “Set OSD string” – opcode 0x64
     • “Set OSD name” – opcode 0x47
     • “CDC command” – opcode 0xF8
HEC - HDMI Ethernet Channel

• Introduced in HDMI v1.4 (latest version is 1.4a)


• Consolidates video, audio, and data streams into a single HDMI cable


• The primary intention is to reduce the amount of cables required to connect
  AV devices together.


• Uses CDC (Capability Discovery and Control) to control Ethernet channels
CDC (Capability Discovery and Control)

CDC is used to:
• Discover potential HDMI Ethernet channels
• Activate and deactivate channels
• Communicate status of channels
CDC messages are sent with the CEC “CDC Message” (0xF8) opcode
All CDC messages are sent to the CEC logical broadcast address (0xF)
CDC message format:
HEC (CDC) Messages

The following messages are used for Capability Discovery and Control:


•   <CDC_HEC_InquireState>
•   <CDC_HEC_ReportState>
•   <CDC_HEC_SetState>
•   <CDC_HEC_RequestDeactivation>
•   <CDC_HEC_NotifyAlive>
•   <CDC_HEC_Discover>
•   <CDC_HEC_SetStateAdjacent>
HEC potential combinations

Possible HECs within a certain HDMI network:




(referenced from HDMI specification v1.4a)
HEC States

• PHEC (Potential HDMI Ethernet Channel) – part of a PHEC if at least one
  HDMI connection is HEC capable


• VHEC (Verified HDMI Ethernet Channel) – part of a VHEC after CDC has
  confirmed HEC capability of all devices in a PHEC via a
  <CDC_HEC_Discover> message


• AHEC (Active HDMI Ethernet Channel) – part of an AHEC after activation of
  all devices in a VHEC via a <CDC_HEC_SetState> message
Network loop prevention

•   Routing loops such as shown
    here are managed using RSTP
    (Rapid Spanning Tree
    Protocol)
Network loop prevention

•   Routing loops such as shown
    here are managed using RSTP
    (Rapid Spanning Tree
    Protocol)


•   HEC2 is disabled to remove
    the loop
Network loop prevention

•   Routing loops such as shown
    here are managed using RSTP
    (Rapid Spanning Tree
    Protocol)


•   HEC2 is disabled to remove
    the loop


•   If HEC1 link is broken, HEC2 is
    restored
Queue control

•   Devices in a HEC network are expected to prioritise traffic. Time sensitive
    application traffic should be forwarded with higher priority than activities
    such as file downloads:
      •   On-line gaming
      •   Video
      •   VoIP
•   This is achieved using a 3 bit priority field in VLAN tags
This is all very interesting, but…

•   I’m never going to be pentesting a home AV network!
•   HDMI connectors are appearing on new laptops and PCs – soon these
    protocols will be implemented in all the major operating systems


•   If I found a bug in an HDMI enabled TV, so what?
•   Plasma/LCD TVs are becoming part of the corporate network infrastructure


•   So how could HDMI protocols affect corporate users?
HEC Risk #1 – Corporate boundary breach


                     • Network-enabled projectors and TVs could
                       circumvent corporate security boundaries


                     • Will users be aware of the capabilities of
                       this technology within their own devices?
HEC Risk #2 – Endpoint Protection Circumvention

                         • HDMI could be used to connect
                           unauthorised network-enabled devices to
                           the corporate network


                         • Endpoint Protection systems (unless they
                           are HEC-aware) will be unable to detect
                           this


                         • Unauthorised devices could introduce
                           malware or exfiltrate sensitive data
HEC Risk #3 – Unauthorised Network Extension


                          • HDMI could be used to create
                            an unauthorised extension to
                            the corporate network


                          • This “private network” would not
                            be visible to corporate network
                            monitoring tool / NIDS devices
Testing HDMI Ethernet Channel

Have I tested any HEC-enabled devices?
no…
The only device I could find that supports HEC is the T+A Blu-ray receiver:




It costs £6000!
Another corporate HDMI security risk

Remember hardware-based key loggers?


Here’s an HDMI video logger - VideoGhost:


•   http://www.keydemon.com/tiny_frame_grabber/
     •   “2GB storage”
     •   “7 year battery life”


This is potentially much more powerful than a key logger!
Conclusions

•   As users demand more and more “seamless” functionality in a plug-and-
    play world there will be a greater need for bi-directional data to be flowing in
    A/V links between devices
•   HDMI Ethernet Channel could have a major impact on corporate security,
    but the technology is still very new and largely unsupported
•   As well as checking for hardware key loggers you should now also be
    checking for video loggers connected to your corporate workstations
•   Before long every laptop will have an HDMI port and they will all support
    CEC, CDC and HEC!
Questions?


Andy Davis, Research Director NCC Group
andy.davis@nccgroup.com

More Related Content

PDF
Fujitsu LIFEBOOK S752 Bios Guide
PPT
12 Dermatology2008
PPT
Allergic rhinitis.
PPTX
Auto antibodies in Autoimmune Connective Tissue Diseases
PPTX
Looking through a Dermoscope
PPSX
Measurement Epidemiology
PPT
Urticaria&amp;angioedema(copiedsenior)
PPTX
Melioidosis.pptx , Burkholderia pseudomallei
Fujitsu LIFEBOOK S752 Bios Guide
12 Dermatology2008
Allergic rhinitis.
Auto antibodies in Autoimmune Connective Tissue Diseases
Looking through a Dermoscope
Measurement Epidemiology
Urticaria&amp;angioedema(copiedsenior)
Melioidosis.pptx , Burkholderia pseudomallei

Viewers also liked (8)

PDF
High Definition Fuzzing; Exploring HDMI vulnerabilities
PDF
Smart TV Insecurity
PDF
Drive it Like you Hacked It - New Attacks and Tools to Wireles
PPT
Развитие технологий генерации эксплойтов на основе анализа бинарного кода
PDF
Introduction of HDMI
PPTX
American Fuzzy Lop
PPTX
OWASP Open SAMM
PDF
Fuzzing underestimated method of finding hidden bugs
High Definition Fuzzing; Exploring HDMI vulnerabilities
Smart TV Insecurity
Drive it Like you Hacked It - New Attacks and Tools to Wireles
Развитие технологий генерации эксплойтов на основе анализа бинарного кода
Introduction of HDMI
American Fuzzy Lop
OWASP Open SAMM
Fuzzing underestimated method of finding hidden bugs
Ad

Similar to What the HEC? Security implications of HDMI Ethernet Channel and other related protocols - 44CON 2012 (20)

PPTX
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
PDF
Iot in-production
PPTX
CableTap - Wirelessly Tapping Your Home Network
PPT
Hip case study tcs iitb
PPT
Videoconferencing Technology Workshop
PDF
Project ACRN CSE Virtualization
PPTX
HOME AUTOMATION USING INTERNET OF THINGS.pptx
PDF
HEAnets' Video Conferencing Service
PDF
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
PDF
Secure IOT Gateway
PDF
7 reasons why video conferencing world will never
PPTX
NodeGrid Bold
PPTX
Welcome to hello real world
PDF
DEFCON 23 - Joshua Smith - high def fuzzing - exploitation over HDMI-CEC
PDF
Unizen Smart Automation Brochure-2015
PDF
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
PPTX
SmartTV Security
PPTX
Cloaking is the new perimeter
PPTX
Cloaking is the new perimeter
PPT
Wireless personal area networks(PAN)
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Iot in-production
CableTap - Wirelessly Tapping Your Home Network
Hip case study tcs iitb
Videoconferencing Technology Workshop
Project ACRN CSE Virtualization
HOME AUTOMATION USING INTERNET OF THINGS.pptx
HEAnets' Video Conferencing Service
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Secure IOT Gateway
7 reasons why video conferencing world will never
NodeGrid Bold
Welcome to hello real world
DEFCON 23 - Joshua Smith - high def fuzzing - exploitation over HDMI-CEC
Unizen Smart Automation Brochure-2015
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
SmartTV Security
Cloaking is the new perimeter
Cloaking is the new perimeter
Wireless personal area networks(PAN)
Ad

More from 44CON (20)

ODP
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
PPTX
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
PPTX
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
PDF
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
PDF
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
PDF
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
PDF
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
PDF
Pwning the 44CON Nerf Tank
PDF
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
PDF
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
PDF
44CON London 2015 - Is there an EFI monster inside your apple?
PPTX
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
PPTX
44CON London 2015 - How to drive a malware analyst crazy
PDF
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
PDF
44CON London 2015 - Going AUTH the Rails on a Crazy Train
PDF
44CON London 2015 - Software Defined Networking (SDN) Security
PDF
44CON London 2015 - DDoS mitigation EPIC FAIL collection
PDF
44CON London 2015 - Hunting Asynchronous Vulnerabilities
PDF
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
PDF
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Pwning the 44CON Nerf Tank
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root

Recently uploaded (20)

PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
1. Introduction to Computer Programming.pptx
PPT
Teaching material agriculture food technology
PDF
Electronic commerce courselecture one. Pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
cuic standard and advanced reporting.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Spectral efficient network and resource selection model in 5G networks
SOPHOS-XG Firewall Administrator PPT.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Per capita expenditure prediction using model stacking based on satellite ima...
1. Introduction to Computer Programming.pptx
Teaching material agriculture food technology
Electronic commerce courselecture one. Pdf
A comparative analysis of optical character recognition models for extracting...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cuic standard and advanced reporting.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Getting Started with Data Integration: FME Form 101
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectroscopy.pptx food analysis technology
Programs and apps: productivity, graphics, security and other tools
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Empathic Computing: Creating Shared Understanding
20250228 LYD VKU AI Blended-Learning.pptx

What the HEC? Security implications of HDMI Ethernet Channel and other related protocols - 44CON 2012

  • 1. What the HEC? Security implications of HDMI Ethernet Channel and other related protocols Andy Davis, Research Director NCC Group
  • 2. UK Offices North American Offices Australian Offices Manchester - Head Office San Francisco Sydney Cheltenham Atlanta Edinburgh New York Leatherhead Seattle London Thame European Offices Amsterdam - Netherlands Munich – Germany Zurich - Switzerland
  • 3. Agenda • Why am I talking about video interfaces? • What does HDMI bring with it? • The CEC protocol – enabling the user to expend as little energy as possible • CECSTeR – The CEC Security Testing Resource • The HEC protocol – you mean I get network access too? • HEC internals and potential security issues • Conclusion
  • 4. Why am I talking about video interfaces? • It all started with a BlackBerry PlayBook research project… • I was investigating USB security at the time (green interface) • What other ports are available? • A power connector (blue interface) – probably not that exciting… • Hmm…microHDMI – what can I do with that? (red interface)
  • 5. HDMI is an output isn’t it? Well…yes and no • Video out • Audio out • Display identification and capability advertisement in via EDID • Remote control via CEC in and out • Network data via HEC in and out • Encryption and authentication data via HDCP and DPCP in and out
  • 6. HDMI - High-Definition Multimedia Interface • http://www.hdmi.org/manufacturer/specification.aspx (HDMI adopters only) • Transmits encrypted uncompressed digital video and audio data using TMDS (Transition-Minimised Differential Signalling) • Supports Enhanced DDC for display identification and capability advertisement • Also it introduces a number of new technologies, which are potentially interesting from a security perspective; these include: • CEC – Consumer Electronics Control • CDC – Capability Discovery and Control • HDCP - High-bandwidth Digital Content Protection • HEC – HDMI Ethernet Channel
  • 7. CEC – I’ve not heard of that before… Trade names for CEC are: • BRAVIA Link and BRAVIA Sync (Sony) • VIERA Link , HDAVI Control, EZ-Sync (Panasonic) • Anynet+ (Samsung) • Aquos Link (Sharp) • SimpLink (LG) • EasyLink (Philips) etc…
  • 8. CEC - Consumer Electronics Control Purpose: • Control two or more HDMI devices using a single remote control • Devices can control each other without user-intervention. Physical: • The architecture of CEC is an inverted tree • One-wire bidirectional serial bus (AV.link) Logical: • Up to ten AV devices can be connected and the topology of a connected system is auto-discovered by the protocol.
  • 9. Supported CEC commands • One Touch Play, System Standby • Pre-set Transfer, One Touch Record • Timer Programming, System Information • Deck Control , Tuner Control • OSD Display, Device Menu Control • Routing Control, Remote Control Pass • Device OSD Name Transfer, System Audio Control
  • 10. The CEC protocol CEC Block layout: CEC Header block: CEC Message: • Messages are either Directed or Broadcast • Logical addresses are 0x0 – 0xF (0 always TV, F always broadcast) • Physical addresses x.x.x.x (TV = 0.0.0.0)
  • 11. Can we fuzz CEC? • Feature rich protocol - could potentially yield some interesting security vulnerabilities in different implementations • Arduino library - http://code.google.com/p/cec-arduino/ • Publicly available Arduino - CEC interface circuit: • USB-CEC Adapter from Pulse Eight: • USB-CEC Bridge from RainShadow Tech:
  • 12. Introducing CECSTeR • Consumer Electronics Control Security Testing Resource • Download it here - http://tinyurl.com/ncctools • Supports CEC and CDC (more on that later) • Capture and display traffic • Send arbitrary commands • Fuzz the protocols • Time for a demo…
  • 14. What are the fuzzer results? My CEC targets: • Sony PS3 – no results • Panasonic Blu-ray player (DMP-BD45) – “random” lockups • BlackBerry PlayBook (very limited CEC functionality) - no results • XBMC (using Pulse-eight USB-CEC Adapter) – Permanent DoS • It “bricked” the Pulse-eight adapter! • Potentially interesting commands include: • “Vendor command” – Opcode 0x89 • “Set OSD string” – opcode 0x64 • “Set OSD name” – opcode 0x47 • “CDC command” – opcode 0xF8
  • 15. HEC - HDMI Ethernet Channel • Introduced in HDMI v1.4 (latest version is 1.4a) • Consolidates video, audio, and data streams into a single HDMI cable • The primary intention is to reduce the amount of cables required to connect AV devices together. • Uses CDC (Capability Discovery and Control) to control Ethernet channels
  • 16. CDC (Capability Discovery and Control) CDC is used to: • Discover potential HDMI Ethernet channels • Activate and deactivate channels • Communicate status of channels CDC messages are sent with the CEC “CDC Message” (0xF8) opcode All CDC messages are sent to the CEC logical broadcast address (0xF) CDC message format:
  • 17. HEC (CDC) Messages The following messages are used for Capability Discovery and Control: • <CDC_HEC_InquireState> • <CDC_HEC_ReportState> • <CDC_HEC_SetState> • <CDC_HEC_RequestDeactivation> • <CDC_HEC_NotifyAlive> • <CDC_HEC_Discover> • <CDC_HEC_SetStateAdjacent>
  • 18. HEC potential combinations Possible HECs within a certain HDMI network: (referenced from HDMI specification v1.4a)
  • 19. HEC States • PHEC (Potential HDMI Ethernet Channel) – part of a PHEC if at least one HDMI connection is HEC capable • VHEC (Verified HDMI Ethernet Channel) – part of a VHEC after CDC has confirmed HEC capability of all devices in a PHEC via a <CDC_HEC_Discover> message • AHEC (Active HDMI Ethernet Channel) – part of an AHEC after activation of all devices in a VHEC via a <CDC_HEC_SetState> message
  • 20. Network loop prevention • Routing loops such as shown here are managed using RSTP (Rapid Spanning Tree Protocol)
  • 21. Network loop prevention • Routing loops such as shown here are managed using RSTP (Rapid Spanning Tree Protocol) • HEC2 is disabled to remove the loop
  • 22. Network loop prevention • Routing loops such as shown here are managed using RSTP (Rapid Spanning Tree Protocol) • HEC2 is disabled to remove the loop • If HEC1 link is broken, HEC2 is restored
  • 23. Queue control • Devices in a HEC network are expected to prioritise traffic. Time sensitive application traffic should be forwarded with higher priority than activities such as file downloads: • On-line gaming • Video • VoIP • This is achieved using a 3 bit priority field in VLAN tags
  • 24. This is all very interesting, but… • I’m never going to be pentesting a home AV network! • HDMI connectors are appearing on new laptops and PCs – soon these protocols will be implemented in all the major operating systems • If I found a bug in an HDMI enabled TV, so what? • Plasma/LCD TVs are becoming part of the corporate network infrastructure • So how could HDMI protocols affect corporate users?
  • 25. HEC Risk #1 – Corporate boundary breach • Network-enabled projectors and TVs could circumvent corporate security boundaries • Will users be aware of the capabilities of this technology within their own devices?
  • 26. HEC Risk #2 – Endpoint Protection Circumvention • HDMI could be used to connect unauthorised network-enabled devices to the corporate network • Endpoint Protection systems (unless they are HEC-aware) will be unable to detect this • Unauthorised devices could introduce malware or exfiltrate sensitive data
  • 27. HEC Risk #3 – Unauthorised Network Extension • HDMI could be used to create an unauthorised extension to the corporate network • This “private network” would not be visible to corporate network monitoring tool / NIDS devices
  • 28. Testing HDMI Ethernet Channel Have I tested any HEC-enabled devices? no… The only device I could find that supports HEC is the T+A Blu-ray receiver: It costs £6000!
  • 29. Another corporate HDMI security risk Remember hardware-based key loggers? Here’s an HDMI video logger - VideoGhost: • http://www.keydemon.com/tiny_frame_grabber/ • “2GB storage” • “7 year battery life” This is potentially much more powerful than a key logger!
  • 30. Conclusions • As users demand more and more “seamless” functionality in a plug-and- play world there will be a greater need for bi-directional data to be flowing in A/V links between devices • HDMI Ethernet Channel could have a major impact on corporate security, but the technology is still very new and largely unsupported • As well as checking for hardware key loggers you should now also be checking for video loggers connected to your corporate workstations • Before long every laptop will have an HDMI port and they will all support CEC, CDC and HEC!
  • 31. Questions? Andy Davis, Research Director NCC Group andy.davis@nccgroup.com