Security researcher cracks Google's Widevine DRM (L3 only)

Image: Widevine team

A British security researcher has cracked the L3 protection level of Google’s Widevine digital rights management (DRM) technology. The hack can allow the researcher to decrypt content transferred via DRM-protected multimedia streams.

While “cracking Google’s DRM” sounds very cool, the hack isn’t likely to fuel a massive piracy wave. The reason is that the hack works only against Widevine L3 streams, and not L2 and L1, which are the ones that carry high-quality audio and video data.

Any user who cracks a Widevine L3 stream would only gain access to grainy low-quality video and lo-fi audio.

Many security and cryptography experts weren’t surprised by the Widevine L3 hack, as the L3 protection level is the lowest one.

Google designed its Widevine DRM technology to work on three data protection levels –L1, L2, and L3– each usable in various scenarios. According to Google’s docs, the differences between the three protection levels is as follows:

  • L1 – all content processing and cryptography operations are handled inside a CPU that supports a Trusted Execution Environment (TEE).
  • L2 – only cryptography operations are handled inside a TEE.
  • L3 – content processing and cryptography operations are (intentionally) handled outside of a TEE, or the device doesn’t support a TEE.

Service providers, such as Hulu or Netflix, usually perform a check of a device to see what Widevine DRM level they support, before sending any actual content.

Because of the varying security levels, which exposes the DRM-encrypted content to attacks, service providers deliver audio and video streams with varying quality levels, with L3 receiving the lowest.

While it was known for a few years that Widevine’s L3 protection level was the weakest, no one until this today found a way to decrypt Widevine L3 encrypted content.

However, today, British security researcher David Buchanan made the first such claim.

“Soooo, after a few evenings of work, I’ve 100% broken Widevine L3 DRM,” Buchanan said on Twitter. “Their Whitebox AES-128 implementation is vulnerable to the well-studied DFA attack, which can be used to recover the original key. Then you can decrypt the MPEG-CENC streams with plain old ffmpeg.”

Albeit Buchanan did not yet release any proof-of-concept code, it wouldn’t help anyone if he did.

In order to get the DRM-encrypted data blob that you want to decrypt, an attacker would still need “the right/permission” to receive the data blob in the first place.

If a Netflix pirate would have this right (being an account holder), then he’d most likely (ab)use it to pirate a higher-quality version of the content, instead of bothering to decrypt low-res video and lo-fi audio.

The only advantage is in regards to automating the pirating process, but as some users have pointed out, this isn’t very appealing in today’s tech scene where almost all devices are capable of playing HD multimedia [1, 2].

For all intents and purposes, Buchanan’s hack is purely an interesting topic of research that has achieved something that many other experts have only speculated until now.

The researcher said he did report the issue to Google. He also said the issue is unfixable, as it’s a design flaw and not a bug or vulnerability.

Google’s Widevine is today’s most popular DRM technology, being used by content providers such as Netflix, Hulu, Disney, HBO, DirectTV, Facebook, Showtime, Jio, Sony and more. Almost all hardware platforms and device makers support it, such as Apple, Samsung, Google, Intel, LG, Roku, Mozilla, and others. If Google decides to update Widevine’s L3 cryptography implementation, patching it would be a considerable and drawn-out effort.

Related coverage:

About the author

E-Crypto News was developed to assist all cryptocurrency investors in developing profitable cryptocurrency portfolios through the provision of timely and much-needed information. Investments in cryptocurrency require a level of detail, sensitivity, and accuracy that isn’t required in any other market and as such, we’ve developed our databases to help fill in information gaps.

Related Posts

E-Crypto News Executive Interviews

Crypto Scams

Beanstalk Farms Loses $80M In A Massive DeFi Governance Flash-Loan Hack
Beanstalk Farms Loses $80M In A Massive DeFi Governance Flash-Loan Hack
April 23, 2022
Joon Pak Head of Crypto at Prove talks to Us about Crypto Fraud And More
April 11, 2022
Mintable CEO Zach Burks Talks to Us about the Opensea Stolen NFTs and Their Recovery
March 21, 2022
Crypto Crime
Crypto Crime Surges To Record Highs As Thieves Follow Market Buzz – Chainalysis 2022 Report
February 24, 2022
Bots Circumvent 2FA Login At Coinbase And Other Crypto Exchanges In 2022
Bots Have Circumvented 2FA Logins At Coinbase And Other Crypto Exchanges In 2022
February 17, 2022

Automated trading with HaasBot Crypto Trading Bots

Blockchain/Cryptocurrency Questions and Answers

Roundtable Interview-What is the Effect of The Russia-Ukraine War on Cryptocurrency Prices?
March 4, 2022
How Does Bitcoin Casino Work + 2021 Beginner’s Guide
November 8, 2021
How to Buy and Sell Cryptocurrency
November 8, 2021
What Are Bitcoin Futures And How Will They Work In 2022?
November 4, 2021
The Unconventional Guide to Ethereum
October 28, 2021

CryptoCurrencyUSDChange 1hChange 24hChange 7d
Bitcoin29,578 0.18 % 0.60 % 2.80 %
Ethereum1,875.8 0.46 % 4.59 % 2.06 %
Tether0.9994 0.01 % 0.11 % 0.08 %
USD Coin0.9989 0.16 % 0.08 % 0.04 %
BNB315.23 0.07 % 3.69 % 9.36 %
XRP0.3969 0.24 % 2.10 % 2.36 %
Binance USD1.003 0.21 % 0.12 % 0.12 %
Cardano0.9566 0.22 % 0.68 % 6.96 %
Solana45.73 0.38 % 5.48 % 8.09 %
Dogecoin0.07968 0.64 % 4.18 % 5.12 %

Bitcoin (BTC) $ 29,617.00
Ethereum (ETH) $ 1,886.14
Tether (USDT) $ 1.00
USD Coin (USDC) $ 1.00
BNB (BNB) $ 315.43
XRP (XRP) $ 0.398317
Binance USD (BUSD) $ 1.00
Cardano (ADA) $ 0.496367
Solana (SOL) $ 45.75
Dogecoin (DOGE) $ 0.079937