Widevine L3 DRM protection hacked
The other day Cyber Security Specialist David Buchanan from the UK announced the successful hacking of Widevine L3 audio / video content protection technology. Hacking makes it possible to dump all data that is transmitted through a communication channel protected by this technology.
Widevine L3 is developed by Google. It is used to protect copyright content distributed over the network. In particular, this technology is implemented in the services of Netflix, Disney, Amazon Video, BBC, HBO, Facebook, Hulu, Spotify, etc.
A CDM module is used to decode protected content. It works, in particular, in Chrome, ChromeOS, Android and Firefox browsers. It is also used by Samsung, Intel, Sony and LG in a number of its products.
It is worth noting that Widevine L3 is the weakest level of protection from Google. Most often they work with him to distribute low-quality media content (below 1080p). Already the second level of protection makes it possible to perform cryptographic operations on the side of a hardware-isolated TEE environment (Trusted Execution Environment, for example, Intel SGX, ARM TrustZone and AMD PSP).
The hacking was carried out due to an error in the implementation of the Whitebox AES-128 encryption algorithm. As it turned out, the algorithm is subject to attack DFA (Differential Fault Analysis). It allows you to access the encryption key, after which audio and video content encrypted with Widevine L3 can be saved without any problems.
As for the second and first levels of Widevine, their found method does not affect.
There is no information about whether Buchanan shared information about the found vulnerability with Google before publishing technical details. It is also unclear whether Google will change anything in Widevine L3.
Widevine L3 is developed by Google. It is used to protect copyright content distributed over the network. In particular, this technology is implemented in the services of Netflix, Disney, Amazon Video, BBC, HBO, Facebook, Hulu, Spotify, etc.
A CDM module is used to decode protected content. It works, in particular, in Chrome, ChromeOS, Android and Firefox browsers. It is also used by Samsung, Intel, Sony and LG in a number of its products.
It is worth noting that Widevine L3 is the weakest level of protection from Google. Most often they work with him to distribute low-quality media content (below 1080p). Already the second level of protection makes it possible to perform cryptographic operations on the side of a hardware-isolated TEE environment (Trusted Execution Environment, for example, Intel SGX, ARM TrustZone and AMD PSP).
The hacking was carried out due to an error in the implementation of the Whitebox AES-128 encryption algorithm. As it turned out, the algorithm is subject to attack DFA (Differential Fault Analysis). It allows you to access the encryption key, after which audio and video content encrypted with Widevine L3 can be saved without any problems.
As for the second and first levels of Widevine, their found method does not affect.
There is no information about whether Buchanan shared information about the found vulnerability with Google before publishing technical details. It is also unclear whether Google will change anything in Widevine L3.