This clever dongle stops attackers infiltrating your HDMI port

A close up of a HDMI cable and a DisplayPort cable
(Image credit: Future)

A new dongle has been developed to prevent cybercriminals from using HDMI ports as means of compromising target endpoints.

The so-called HDMI Firewall blocks all communication going in and out of the HDMI port that is not directly related to audio or video. Each HDMI port requires a new dongle, but one can easily be repurposed to fit different ports.

The dongle was designed by one “kingkevin”, who uploaded the project to source code repository CuVoodoo git.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022end of this survey

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

Switching dongles around

Admittedly, actually deploying the dongle would be no simple feat for someone without a fair amount of expertise.

To use the dongle, someone would first need to program it to fit the port it’s being applied to. That means copying the Extended Display Identification Data (EDID) information, including data like resolutions supported. Users can read this data with an I2C-based Display Data Channel (DDC) interface from the endpoint.

The next step is to write the EDID data into the EEPROM of the HDMI Firewall, which comes with a physically detachable protection tab that locks the connector’s EEPROM from future writes.

To move the dongle onto a new device, users need to disable write protection once again, by putting a solder blob across two pads on the device, rewrite it with the new port’s EDID data, and re-enable protection by removing the solder that connects the two pads. 

As explained by Tom’s Hardware, an HDMI connector allows for the passthrough of more than just audio and video data. A couple of parallel protocols are moving extra data through, including High-bandwidth Digital Content Protection, or HDCP. This protocol makes sure the data passing through the port isn’t copied in transit,

Other notable mentions include the Hot-Plug Detection (HPD), and Consumer Electronics Control (CEC). The latter is relatively popular, as it allows remote controls and other gadgets to control the devices. 

Via Tom's Hardware

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Apple users facing new security risks after critical USB component hacked
China
Chinese hackers develop effective new hacking technique to go after business networks
A pair of DisplayPort cable connectors laid across a laptop keyboard.
Listen up, PC gamers: it’s time for DisplayPort cables to die, sorry not sorry
AI business data center
"It is literally driving our product development direction" - how Cisco is redefining networking security to better protect against cyberattacks and human error
A finger touching the google chrome icon in the Windows 10 start menu
A new Chrome browser highjacking attack could affect billions of users - here's how to fight it
Satellite
NATO wants to build an alternative satellite-based internet to be used in case of emergency
Latest in Security
NordProtect logo
Standalone identity theft protection from Nord Security is now available
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
Ofcom cracks down on UK tech firms, will issue sanctions for illegal content
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
These fake GitHub "security alerts" could actually let hackers hijack your account
3d rendering of a submarine power cable on the seabed
Subsea internet cables can now ‘listen’ for sabotage using irregular pulses of light
Dark Web monitoring
A worrying critical security flaw in Apache Tomcat could let hackers take over servers with ease
A graphic showing someone on a tablet working through a supply chain.
Security issue in open source software leaves businesses concerned for systems
Latest in News
Google Cloud logo
Google to acquire cloud security platform Wiz in $32 billion deal
FCC filing for the Nothing CMF Buds 2 Plus
Nothing’s next-gen CMF cheap earbuds slated to arrive within the month, but don’t expect hi-res audio support
John Loeffler holding the Ryzen 7 7800X3D
Great news! The best gaming CPU ever made is finally available for it's original MSRP again
Garmin Instinct 3
A new Garmin study hints at the link between burning calories and happiness, and I've got good and bad news
A woman sitting in a chair looking at a Windows 11 laptop
Microsoft is supercharging Windows 11’s voice commands on Copilot+ PCs with Snapdragon CPUs, and fine-tuning a few Recall features
MacBook Air M4
Apple's rumored foldable iPad tipped to launch sooner than expected with an exciting software twist