Advertisement
Canada markets closed
  • S&P/TSX

    21,642.87
    -97.33 (-0.45%)
     
  • S&P 500

    5,051.41
    -10.41 (-0.21%)
     
  • DOW

    37,798.97
    +63.86 (+0.17%)
     
  • CAD/USD

    0.7235
    +0.0002 (+0.03%)
     
  • CRUDE OIL

    85.27
    -0.09 (-0.11%)
     
  • Bitcoin CAD

    88,290.81
    +781.12 (+0.89%)
     
  • CMC Crypto 200

    885.54
    0.00 (0.00%)
     
  • GOLD FUTURES

    2,400.30
    -7.50 (-0.31%)
     
  • RUSSELL 2000

    1,967.48
    -8.23 (-0.42%)
     
  • 10-Yr Bond

    4.6590
    +0.0310 (+0.67%)
     
  • NASDAQ futures

    17,907.00
    +25.75 (+0.14%)
     
  • VOLATILITY

    18.40
    -0.83 (-4.32%)
     
  • FTSE

    7,820.36
    -145.17 (-1.82%)
     
  • NIKKEI 225

    38,471.20
    -761.60 (-1.94%)
     
  • CAD/EUR

    0.6808
    0.0000 (0.00%)
     

Roku jailbreak gives users control over what channels they install

Roku has responded, saying the RootMyRoku vulnerabilities are now mitigated in its v9.4 software

What Hi-Fi Magazine via Getty Images

It's been years since the GTV Hacker team revealed a method to get root access on Roku devices, but now they operate under the Exploitee.rs banner and once again point out a software crack for the streaming hardware.

According to RootMyRoku developer llamasoft, the exploit takes advantage of a pair of vulnerabilities to enable a persistent root jailbreak. It should work on RokuOS v9.4.0 with the Realtek WiFi chip, which includes "almost all" Roku TVs and some of the boxes. RokuOS 10 blocks this particular method, but you may not have received the update yet.

Obviously this is useful for enthusiasts wanting more control of their box, but it does present some security issues, and on the Github page, the developer pleads with Roku to follow the lead of other companies in creating a bug bounty program. That would pay people who find these exploits, giving them more of a reason to find and highlight them so they can be fixed, rather than enabling any kind of nefarious activity.

ADVERTISEMENT

Update (5/18): Roku has replied with a statement, noting that customer data has not been exposed and the company also says it has mitigated the vulnerabilities in devices running Roku OS 9.4 as well.

As part of our continuous monitoring, the Roku security team identified and addressed vulnerabilities in the Roku OS – though these vulnerabilities did not expose customer data and we did not identify any malicious activity. We always want to do everything we can to maintain a secure environment for Roku, our partners, and our users, and we therefore mitigated the vulnerabilities and updated Roku OS 9.4 with no impact to the end user experience.