All LG TV owners told to check their settings immediately – don’t ignore new warning

Staff
By Staff

Do you have an LG TV in your house? You’d be wise to check the settings menu without delay.

If you own an LG TV then it’s highly recommended that check your settings without delay. The urgent warning has been issued after the security team at Bitdefender discovered a number of vulnerabilities within LG’s WebOS TV software platform. Once infected, cyber crooks can then take control of the TVs and not only try to steal user names and passwords from popular streaming services but also attempt to access other devices that are connected to the same Wi-Fi network as the telly.

“We have found several issues affecting WebOS versions 4 through 7 running on LG TVs. These vulnerabilities let us gain root access on the TV after bypassing the authorization mechanism.”

The worrying glitches have now been fixed by LG but it’s vital to make sure your television is running the very latest software so it’s protected against any future attacks.

It’s thought that, to date, around 90,000 LG screens may have been targeted by the threat and it’s vital you don’t become the next victim.

To make sure your telly is up to date with the latest security patches simply head to Settings > Support > Software Update, and select “Check for Update.”

If an update is available then it’s a good idea to install it without delay.

In a statement sent to TechRadar, LG said: “LG was aware of the issue, and all necessary patches have now been completed. We can confirm LG smart TVs are safe and security is our highest priority. Customers are advised to enable automatic software updates”.

Here is a full list of Vulnerable OS versions

• webOS 4.9.7 – 5.30.40 running on LG43UM7000PLA

• webOS 5.5.0 – 04.50.51 running on OLED55CXPUA

• webOS 6.3.3-442 (kisscurl-kinglake) – 03.36.50 running on OLED48C1PUB

• webOS 7.3.1-43 (mullet-mebin) – 03.33.85 running on OLED55A23LA

Share This Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *