In this way, an attacker can remotely take control over the victim's computer that is operated with an affected receiver of this device. Thus, an attacker is able to send arbitrary keystrokes to a victim's computer system, e.g., to install malware when the target system is unattended. Logitech Unifying devices allow live decryption if the pairing of a keyboard to a receiver is sniffed.ĭue to unencrypted and unauthenticated data communication, the wireless presenter Logitech R700 Laser Presentation Remote R-R0010 is prone to keystroke injection attacks. NOTE: this issue exists because of an incomplete fix for CVE-2016-10761. The attacker must press a "magic" key combination while sniffing cryptographic data from a Radio Frequency transmission. Logitech Unifying devices allow keystroke injection, bypassing encryption. On Windows, any text may be injected by using ALT+NUMPAD input to bypass the restriction on the characters A through Z. The Logitech R500 presentation clicker allows attackers to determine the AES key, leading to keystroke injection. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.Ĭertain Logitech Unifying devices allow attackers to dump AES keys and addresses, leading to the capability of live decryption of Radio Frequency transmissions, as demonstrated by an attack against a Logitech K360 keyboard. In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. ![]() ![]() Logitech Z120 and S120 speakers through allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. Successful exploitation of these vulnerabilities may escalate the permission to the system user. There is a Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability in Logitech Sync for Windows prior to 2.4.574. This leaves applications vulnerable to CSRF attacks during authentication and authorization operations. The OAuth 2.0 state parameter was not properly validated. An issue was discovered in Logitech Options.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |