Digital satellite TV platform

General info

In a result of its research investigation efforts, Security Explorations discovered multiple critical security vulnerabilities in a major polish digital satellite TV platform and selected set-top-boxes implementing Conax conditional access system with chipset pairing functionality.

This section of our website presents the most crucial information regarding the project that lead to this discovery:

  • Official press statement containing general information about the impact of the vulnerabilities.
  • Frequently Asked Questions about our discovery.
  • Information about Proof of Concept code illustrating discovered security issues.
  • Technical details of conducted attacks and security issues found.
  • Status of the communication with vendors of affected technologies.

Project newsroom

Digital satellite TV platform - Press Info no. 3
7
MAR 2012

Digital satellite TV platform - Press Info no. 3

Security Explorations, a security and vulnerability research company from Poland, discovered multiple security vulnerabilities in the major (...)

Read more
Digital satellite TV platform - Press Info no. 2
2
FEB 2012

Digital satellite TV platform - Press Info no. 2

Security Explorations confirms and acknowledges all information that has been published on a company's website since Jan-03-2012 (...)

Read more
Digital satellite TV platform - Press Info no. 1
3
JAN 2012

Digital satellite TV platform - Press Info no. 1

Security Explorations' founder and CEO, Adam Gowdiak will give two talks at Hack In The Box Security Conference in Amsterdam [1] in May 2012 (...)

Read more

FAQ

What was the goal of your digital satellite TV research?

One of the missions of our company is to increase general awareness of users and vendors in the area of computer and Internet security. Pro Bono security research is the essential part of that mission.

By verifying security of digital satellite set-top-boxes we wanted to find out whether they pose any security risks to end users if connected to the Internet.

How do weaknesses in satellite set-top-box devices affect end users security?

These days, set-top-boxes are no more dumb devices that can only process and display digital satellite signal on end users' TV screen. These are complex systems that run atop of dedicated hardware and software. In response to growing users need, they also usually offer access to different Internet services such as World Wide Web in particular.

Being part of a global network, set-top-box devices cannot be perceived as dumb devices any more. Instead, they should be perceived as any other networked / communication equipment such as mobile phones and PCs. This perception involves considering potential security risks posed to end users as well.

It is thus natural to consider whether digital satellite equipment deployed in subscribers' homes do not open unauthorized access to their home networks via vulnerable set-top-box devices. Similarly, it is natural to consider whether access to any TV / VOD programming which decent users paid for could be stolen from them by attackers.

What's the actual impact of your discovery?

We've shown that malware can infect digital satellite set-top-boxes in the very same way as it does infect personal computers these days. We have demonstrated that malware code can persistently and without the users' consent be installed on digital satellite set-top boxes. Once installed, such malware code can operate silently on a target device and can provide full access to it for remote attackers. From that point, all sorts of malicious activities could be conducted on a hijacked set-top-box, of which stealing the digital satellite signal seemed to be the most interesting and novel scenario in our opinion.

We've actually proved that properly implemented malware can successfully steal and distribute digital satellite TV signal from a set-top-box subscriber in the environment of platform "N".

What does it mean that your vulnerabilities affect a digital satellite TV platform?

The weaknesses found span across multiple vendors, whose software / hardware products were used to create a digital satellite platform "N". The platform has a more generic meaning here - it is about devices, but also about the network and services.

What was the goal of your digital satellite TV research?

One of the missions of our company is to increase general awareness of users and vendors in the area of computer and Internet security. Pro Bono security research is the essential part of that mission.

By verifying security of digital satellite set-top-boxes we wanted to find out whether they pose any security risks to end users if connected to the Internet.

Are other digital satellite TV platforms affected too?

Security Explorations worked with the equipment of only one digital satellite TV provider (Platform "N").

We found several clues [1][2][3][4] that let us think the equipment of some other digital satellite TV providers might be also vulnerable to some of the issues found.

Information about the real impact of the flaws requires verification with the vendors (set-top-box manufacturer and semiconductor company in particular). Since we didn't receive any information from a set-top-box / DVB chipsets manufacturers about the impact of the reported issues, we suggest that all interested parties (customers, journalists, etc.) contact Advanced Digital Broadcast and STMicroelectronics companies directly for any impact related inquiries.

What's the chipset pairing attack all about?

Chipset pairing technology was invented to protect against hacking satellite TV. Chipset pairing uniquely ties a given subscriber's smartcard with a corresponding set-top-box equipment. The pairing has a form of a cryptographic function. It is usually implemented in a silicon (DVB chipset). The goal of the latter is to prevent set-top-box hijacking and unauthorized sharing / distribution of a satellite TV programming.

The weaknesses in a chipset pairing technology may be used by intruders (or malware code) to silently share access to premium content (such as HBO, Cinemax, BBC, Discovery, etc.) with other, non paying users. This obviously poses a great security threat to the revenue of digital satellite TV operators and content providers.

Security Explorations discovered several security weaknesses in the implementation of the chipset pairing functionality used by the investigated devices. We discovered that for STi7100 / STI7111 DVB chipsets, it is possible to extract plaintext values of Control Word cryptographic keys - the keys that protect security of content in a digital satellite TV system. For STi7111 DVB chipset, we also discovered a way to extract the plaintext value of the pairing key itself. By doing so, we broke security of the pairing function and the cryptographic relationship between a subscriber's smartcard and a set-top-box' DVB chipset.

What's the origin of DVB chipsets flaws you found?

Taking the nature of the flaws and the actual hardware component they affect (dedicated crypto core embedded in a silicon chip), we would not be surprised if it turned out that the issues discovered have their roots in an improperly implemented hardware component (potentially hardware bug).

It is however up to the DVB chipset vendor to make a final verdict in that case.

How many set-top-box devices could be incorporating vulnerable DVB chipsets?

Some sources [5] state that a cumulative total of more than 400 million MPEG-2 and MPEG-4 decoder chips used worldwide in STBs, digital television sets and DVD/Bluray players were shipped to the market by STMicroelectronics (as of 2007). STMicroelectronics own sources [7] mention 541 millions as the number of these chipsets released to the market in 2008. They also speak about the company as #1 chipset vendor in H.264 market (68% of market share in 2008). It is however very difficult for us to provide any precise number with respect to how many of these chips are actually vulnerable to the issues found. What we know is that we discovered security issues in Gen-1 (STi7100) and Gen-2 (STi7111) chipsets. This means that some other chipsets from these generations could be vulnerable to the issues found (such as STi7101, STi7109 sharing same SoC architecture with vulnerable STi7100). But again, DVB chipset vendor should make a final verdict in that case.

Since on Jan-17-2012, STMicrolectronics informed us that no confidential information would be disclosed to Security Explorations in response to our impact inquiry questions, we suggest that all interested parties (customers, journalists, etc.) contact STMicroelectronics company directly for any impact related inquiries.

What about the remote attack that you mentioned?

We found a remote attack vector allowing for the execution of malware code on selected set-top-box receivers used by the platform "N".

As of Jan-12-2012, it was not possible to use this attack vector anymore. On Feb-01-2012, Onet.pl S.A. officially confirmed to us the fixing of the issues reported to the company.

That attack made use of a specially crafted web page in order to distribute malware code into set-top boxes of visiting users. It exploited the possibility to embed potentially malicious sequence of JavaScript code in the web page of a trusted service (Onet Foto) visited by the users of vulnerable set-top-box devices.

The attack was very dangerous as the infection process could proceed in a completely stealth and automatic fashion. However, its successfull launch did require multiple security issues to be combined together (3 in total):
- CSS in a trusted web service (Onet Foto),
- a bug in AIT handler / support for arbitrary Xlet execution,
- the use of "/" in system classpath / JVM class loading order.

The actual attack details were disclosed at Hack In The Box Security Conference in Amsterdam [6]. Presentation materials for the two talks given there are available to download from here.

What was the most difficult part of this research?

Gluing together multiple pieces of information for the purpose of discovering the operation of an unknown crypto processor embedded in a dedicated DVB chipset (system-on-chip). This includes reverse engineereing from scratch the instruction set of some unknown processor core.

How long did you work on this project?

Without taking into account many breaks, it would be a total of about 1.5 years of work.

Do you plan to release more technical information about the issues uncovered?

We published the results of this research on 24 May 2012 at Hack In The Box Security Conference in Amsterdam [6].

In general, we support publication of vulnerability information. Such information dissemination usually allows to improve the overall state of the art of the whole security field.

Do you plan to include this research in your Vulnerability Research Program?

No. SE-2011-01 is a Pro Bono security research project. This means that all vendors of affected technologies are given information about vulnerabilities in their products completely for free. Depending on the nature of the flaws, some vendors can be also provided with selected source code of our Proof of Concept code as well.

Per our disclosure policy, only original vendors of the affected technology or software are provided with brief vulnerability information.

Aren't you afraid that publishing information about security weaknesses in digital satellite equipment may cause more harm than good?

No, we are not. By pointing out weaknesses in a digital satellite TV equipment, we actually helped different vendors improve security of their products. By choosing not to publish any details pertaining to the weaknesses found, we took the steps aimed at protecting the users of affected technologies. For nearly 6 years, we have also kept our ST DVB chipsets reverse engineering tools under wraps, thus giving the vendors and operators sufficient time to address the issues (improve security of set-top-box devices, replace vulnerable DVB chipsets / STB devices, work with STMicroelectronics to mitigate the issues).

References:

PoC Codes

Last update: May-28-2012

Characteristics of the Proof of Concept (PoC) code developed during the research of digital satellite TV platform's security:

  • 145 Java classes,
  • 34000 lines of source code,
  • 345 kb of compiled jar file,
  • implementation of over 70 commands,
  • compatibility with ITI5800S, ITI5800SX, ITI2850ST, ITI2849ST digital satellite receivers and STi7100 / STi7111 processors.

Commands implemented by Security Explorations' proof of concept code illustrate the following:

  • ability to escape Java security sandbox,
  • ability to escape OS security sandbox,
  • full read/write access to file system (sample)
  • privilege elevation to OS admin,
  • full read/write kernel and I/O space access (arbitrary system call installation)
  • smart card interface interception (sample)
  • runtime firmware interception of STi7111's embedded crypto processor,
  • firewall disabling,
  • java and system level directory tree listing (sample),
  • java and system level file/directory tree transfer (sample)
  • access to information about system configuration (serial number, software version, hardware type, network configuration) (sample)
  • access to information about MPEG services (sample)
  • access to information about various cryptographic keys (Conax, chipset, hdcp and upgrade) (sample)
  • access to Push Video on Demand (PVOD) movies and its properties (sample)
  • access to Electronic Program Guide (EPG) (sample)
  • access to information about user's subscription's status (sample)
  • Digital Video Recorder (DVR) control (scheduling recording, management of existing recordings and PVOD files),
  • playing of arbitrary user provided video content fetched from Internet (MPEG files),
  • Xion web browser control (opening arbitrary URL's, stealth URLs redirection, http and https requests sniffing),
  • graphic screen capture (sample)
  • control over the TV remote (imitation of the keyboard input),
  • displaying arbitrary messages on a user's TV screen,
  • access to other subscribers' broadcasted invoice data (billing information),
  • download and decryption of device's upgrade image (sample)
  • DSMCC carousels mounting,
  • simple MPEG sniffing by PID value (sample)
  • access to SI MPEG sections (PAT, PMT) (sample)
  • MPEG stream capture of arbitrary programming (including HD programming) (sample)
  • Video on Demand ECM decryption and sharing of programming protected with Conax conditional access method with chipset pairing,
  • reuse of Video on Demand access rights (beyond rental period of 48 hours),
  • Control Words sharing via network between arbitrary decoders protected with Conax conditional access method and chipset pairing,
  • persistent and stealth backdoor installation,
  • automatic backdoor execution upon system startup.

Details

This page presents details of security vulnerabilities discovered as a result of our digital satellite TV research project. These details are provided in a form of presentation slides for the two talks that were given by Adam Gowdiak on 24 May 2012 at Hack In The Box Security Conference in Amsterdam.

Presentation slides

  • "Security threats in the world of digital satellite television", PDF file, 2.4MB (download)
  • "Security vulnerabilities of Digital Video Broadcast chipsets", PDF file, 1.9MB (download)

Cumulative Vulnerability Reports

  • SE-2011-01 Issues #5-16,#25-32 (Advanced Digital Broadcast), PDF file, 370KB (download)
  • SE-2011-01 Issues #17-19 (STMicroelectronics), PDF file, 293KB (download)
  • SE-2011-01 Issues #22-23 (Conax AS), PDF file, 283KB (download)

Vulnerability Reports in Polish

  • SE-2011-01 Issue #1 (Onet.pl), PDF file, 238KB (download)
  • SE-2011-01 Issue #2 (Onet.pl), PDF file, 384KB (download)
  • SE-2011-01 Issue #3 (Onet.pl), PDF file, 363KB (download)
  • SE-2011-01 Issue #4 (Onet.pl), PDF file, 234KB (download)
  • SE-2011-01 Issue #20 (ITI Neovision), PDF file, 376KB (download)
  • SE-2011-01 Issue #24 (DreamLab Onet.pl), PDF file, 346KB (download)

Additional materials

  • Ideas regarding vulnerabilities in ST DVB chipsets, PDF file, 558KB (download)
  • The origin and impact of security vulnerabilities in ST chipsets, PDF file, 1597KB (download)
  • NC+ Multiroom service bypass, PDF file, 703KB (download)

Additionally, the slides for a keynote talk given at JavaLand conference in 2016 are also provided. This talk referred to SE-2011-01 and our other research projects while discussing key problems related to Java platform security, its ecosystem and vendors.

  • "Java (in)security", PDF file, 1.4MB (download)

DISCLAIMER

Proof of Concept Codes below are provided purely for educational purposes only. It is expressly forbidden to use them for any purposes that would violate any domestic or international laws. If you do not agree with this policy, please leave this page.

  • "Security weaknesses in a digital satellite TV platform", Proof of Concept codes, ZIP file, 1014KB (download)
  • "NC+ Multiroom service bypass", Proof of Concept code, ZIP file, 19KB (download)

Vendors

This page presents current status of the communication process with vendors of affected technologies.

Vendors not responding to our email messages for 7+ days:

  • Advanced Digital Broadcast
    awaiting response to the message from 11-Jan-2012
  • ITI Neovision
    awaiting response to the message from 01-Feb-2012
  • STMicroelectronics
    awaiting response to the message from 11-Apr-2017 / 18-Apr 2018
  • NC+
    awaiting response to the message from 23-Feb-2018
  • CERT-FR
    awaiting response to the message from 15-Mar-2018
  • Vivendi
    awaiting response to the message from 24-Mar-2018
  • IT-CERT
    awaiting response to the message from 03-Apr-2018
  • Canal+
    awaiting response to the message from 03-Apr-2018
  • US-CERT
    awaiting response to the message from 02-May-2018

Summary of the communication process:

  • 02-Jan-2012
- Initial requests for security contacts are sent to Onet.pl S.A, Advanced Digital Broadcast, STMicroelectronics, ITI Neovision, Conax AS, DreamLab Onet.pl S.A.
- Contact information received from Onet.pl S.A. and DreamLab Onet.pl S.A.
  • 03-Jan-2012
- Vulnerability Notices are sent to Onet.pl S.A (Issues 1-4) and DreamLab Onet.pl S.A. (Issue 24).
- Contact information received from ITI Neovision - awaiting response and PGP key.
  • 04-Jan-2012
- As a result of no response to our Jan 2nd inquiry, Advanced Digital Broadcast, STMicroelectronics and Conax AS are contacted again and asked for proper security contact.
- Request for confirmation of a successfull report decryption is sent to Onet.pl S.A. / DreamLab Onet.pl S.A.
- Onet.pl S.A. / DreamLab Onet.pl S.A. confirms successfull reception and decryption of vulnerability reports.
- Advanced Digital Broadcast responds to our contact inquiry.
- Contact information received from Conax AS to which Vulnerability Notices are sent (Issues 22-23).
- Conax AS confirms successfull reception and decryption of vulnerability reports.
- PGP key received from ITI Neovision to which Vulnerability Notices are sent (Issues 20-21).
- ITI Neovision confirms successfull reception and decryption of vulnerability reports.
- Contact information received from STMicroelectronics to which Vulnerability Notices are sent (Issues 17-19).
- Contact information received from Advanced Digital Broadcast to which Vulnerability Notices are sent (Issues 5-16).
  • 05-Jan-2012
- Requests for confirmation of successfull reports decryption are sent to Advanced Digital Broadcast and STMicroelectronics
  • 06-Jan-2012
- STMicroelectronics confirms successfull reception and decryption of vulnerability reports.
  • 07-Jan-2012
- Advanced Digital Broadcast confirms successfull reception and decryption of vulnerability reports.
  • 11-Jan-2012
- Inquiries about the impact of the reported vulnerabilities are sent to Advanced Digital Broadcast and STMicroelectronics.
  • 12-Jan-2012
- Request for status update regarding fixed bugs is sent to Onet.pl S.A. / DreamLab Onet.pl S.A.
  • 17-Jan-2012
- STMicroelectronics informs that no confidential information will be disclosed to Security Explorations in response to its impact inquiry (question about the list of vulnerable DVB chipsets models/versions, questions about set-top-box manufacturers and digital satellite TV providers relying on affected chipsets, etc.). STMicroelectronics informs that it is still under the process to analyse received data.
  • 23-Jan-2012
- Security Explorations asks STMicroelectronics whether the list of products vulnerable to reported security issues is also company's confidential information.
  • 01-Feb-2012
- Requests for status update / results of the analysis are sent to Onet.pl S.A, Advanced Digital Broadcast, ITI Neovision, Conax AS, DreamLab Onet.pl S.A.
- Onet.pl S.A / DreamLab Onet.pl S.A. confirm fixing of reported security issues (Issues 1-4 and 24).
  • 03-Feb-2012
- Conax AS provides the results of its analysis of reported issues. The company informs Security Explorations that it does not regard Issues 22 and 23 as security bugs. Issue 22 is assumed to be caused by a configuration feature of Conax CAS.
- Security Explorations responds to Conax AS and expresses a disagreement with the results of the company's analysis. Security Explorations provides its reasoning and asks Conax AS whether the company still considers reported issues 22 and 23 as non-security ones. Security Explorations also seeks for confirmation of the nature of Issue 22.
  • 22-Feb-2012
- Conax AS provides additional information regarding Issue 22. The company informs that upon additional data and analysis, Issue 22 is understood not to be caused by a previously assumed configuration feature of Conax CAS, but is the result of running the affected service in a way specific to older generation of Conax systems.
  • 16-Mar-2012
- STMicroelectronics informs that company's teams are completing analysis of the work and details provided by Security Explorations. The company asks for confirmation of one attack detail.
- Security Explorations confirms the attack detail to STMicroelectronics.
  • 22-Mar-2012
- STMicroelectronics asks for confirmation of one attack detail regarding Issue 18.
- Security Explorations responds that it cannot provide the confirmation and delivers its answer based on the conducted analysis and tests.
  • 23-Mar-2012
- Security Explorations provides STMicroelectronics with additional information / results of the tests regarding Issue 18.
  • 11-Apr-2017
- Security Explorations asks STMicroelectronics whether 5 years after the disclosure of the issues and in the context of the company exiting the set-top box chipsets business, STMicroelectronics is ready to provide a list of ST chipsets that were vulnerable to the issues found and reported as part of SE-2011-01 project.
  • 19-Feb-2018
- Security Explorations inquiries NC+ about a replacement of STBs offered to subscribers (whether STBs vulnerable to STMicroelectronics vulnerabilities are replaced, whether the replacement process is required by content providers, how many vulnerable STB's got replaced, what costs were incurred by end users). The UOKiK - Polish Government's Office of Competition and Consumer Protection is attached to the message.
  • 23-Feb-2018
- NC+ responds that it undertakes multiple measures aimed at providing high security of the offered content. The goal of a replacement process of set-top-boxes is to improve security level of a broadcasted signal, which is a requirement of agreements signed with content providers. Any information pertaining to technology area is a confidential information of the company and cannot be disclosed to general public.
- Security Explorations asks NC+ for a contact at Canal+ group where questions pertaining to security / STB replacement could be sent. The company also asks NC+ about the reasons of 1) charging NC+ subscribers for a replacement of STBs containing vulnerable ST chipsets 2) of not incurring these costs by NC+ operator or providers of the flawed devices (STB manufacturer, chipset vendor), 3) treating confirmation of STB devices being affected to STMicroelectronics flaws as confidential information of the company.
  • 03-Mar-2018
- Security Explorations asks CERT-FR (French governmental CSIRT) and IT-CERT (CERT Nazionale Italia) for assistance aimed at obtaining information from STMicroelectronics regarding security issues found in their chipsets (information about vulnerable chipset models and their versions, whether vulnerable IC such as TKD Crypto core of STi7111 SoC was used in other vendors' solutions such as e-passports, banking cards and SIM cards, information about STMicroelectronics actions conducted to address the issues). Additionally, the company asks CERT-FR for a contact to the security team of Canal+ Group where inquiries regarding the replacement process of STBs vulnerable to STMicroelectronics issues by NC+ operator in Poland could be sent.
- CERT-FR informs that provided information has been forwarded to the appropriate teams and is currently being reviewed.
  • 13-Mar-2018
- Security Explorations asks IT-CERT for a confirmation of a successful reception of the message from Mar 3, 2018.
- IT-CERT confirms reception of the message. The team declares to keep Security Explorations informed about further developments.
  • 15-Mar-2018
- Security Explorations repeats a request to CERT-FR for a contact to the security team of Canal+ Group.
- CERT-FR responds that it is not in direct contact with the Canal+ team, and as it is part of a contracted relation between ST and their clients, it is not CERT-FR's role to transfer this information to Security Explorations. CERT-FR recommends to contact directly ST society (ST CSIRT team attached to the message), which will be able to answer Security Explorations' request.
- Security Explorations asks CERT-FR for clarification, whether the response received also means that CERT-FR will not assist Security Explorations in obtaining information from STMicroelectronics regarding security issues found in their chipsets (information about affected products and addressing of the issues).
  • 24-Mar-2018
- Security Explorations asks Vivendi (a parent company of Canal+ Group) for e-mail contact where questions could be sent regarding a security and replacement process of set-top-box devices based on STMicroelectronics chipsets used by NC+ operator from Poland.
  • 03-Apr-2018
- Security Explorations asks IT-CERT whether there have been any developments / whether IT-CERT has been able to obtain any information from STMicroelectronics pertaining to the request from Mar 3, 2018.
- Security Explorations contacts a person responsible for a security at Canal+ Group. The company inquiries Canal+ about security and a replacement of STBs offered by NC+ to subscribers (whether STBs vulnerable to STMicroelectronics vulnerabilities are replaced, how many vulnerable STB's got replaced, what costs were incurred by end users, the reasons of charging NC+ subscribers for a replacement of STBs containing vulnerable ST chipsets, the reasons of not incurring these costs by NC+, Canal+ Group or providers of the flawed devices such as STB manufacturer or a chipset vendor).
  • 05-Apr-2018
- Security Explorations asks a person responsible for a security at Canal+ Group for a confirmation of a successful reception of the message from Apr 03, 2018. The company also asks for a more official e-mail address to Canal+ Group security team or its representative, which could be used for further communication.
  • 11-Apr-2018
- Security Explorations asks US-CERT (US government CERT) for assistance aimed at obtaining information from STMicroelectronics regarding security issues found in their chipsets (information about vulnerable chipset models and their versions, whether vulnerable IC such as TKD Crypto core of STi7111 SoC was used in other vendors' solutions such as e-passports, banking cards and SIM cards, information about STMicroelectronics actions conducted to address the issues).
  • 16-Apr-2018
- Security Explorations asks US-CERT for a confirmation of a successful reception of the message from Apr 11, 2018.
- US-CERT confirms successful reception of the message. The organization provides a ticket number and informs that it is currently assigned to its analysts for review.
  • 18-Apr-2018
- Security Explorations contacts STMicroelectronics' CSIRT team. The company requests information from STMicroelectronics regarding security issues found in their chipsets (information about vulnerable chipset models and their versions, whether vulnerable IC such as TKD Crypto core of STi7111 SoC was used in other vendors' solutions such as e-passports, banking cards and SIM cards, information about STMicroelectronics actions conducted to address the issues).
- Security Explorations informs NC+, a person responsible for security at Canal+ Group and Vivendi that the company is awaiting a response to an inquiry pertaining to the replacement process of STB devices affected by security vulnerabilities in ST chipsets conducted by NC+ operator in Poland. No response to the inquiry along information received from NC+ on Feb, 23 2018 will be at the base of filing a formal notification to the UOKiK - Polish Government's Office of Competition and Consumer Protection.
  • 19-Apr-2018
- Security Explorations asks STMicroelectronics' CSIRT team for a confirmation of a successful reception of the message from Apr 18, 2018.
  • 20-Apr-2018
- Security Explorations notifies US-CERT about publication of additional information pertaining to the origin and impact of ST vulnerabilities.
  • 02-May-2018
- Security Explorations asks US-CERT whether there have been any developments / whether US-CERT has been able to obtain any information from STMicroelectronics pertaining to the request from Apr 11, 2018.
  • 20-Aug-2018
- US-CERT sends a follow up message to make sure that Security Explorations received the information requested from the organization. The status of the case indicated in the US-CERT message is set to resolved.
  • 21-Aug-2018
- Security Explorations informs US-CERT that it did not receive any information / response to its initial inquiry and a follow up message. The company informs that it cannot agree with US-CERT evaluation of the case / security vulnerabilities in STMicroelectronics chipsets as resolved.
  • 01-Sep-2018
- Security Explorations asks US-CERT about the basis on which the organization (US-CERT) have come to the conclusion that the case / security vulnerabilities in STMicroelectronics chipsets has been resolved.