296
VMScore

CVE-2019-13053

Published: 29/06/2019 Updated: 24/08/2020
CVSS v2 Base Score: 3.3 | Impact Score: 2.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 296
Vector: AV:A/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Logitech Unifying devices allow keystroke injection, bypassing encryption. The attacker must press a "magic" key combination while sniffing cryptographic data from a Radio Frequency transmission. NOTE: this issue exists because of an incomplete fix for CVE-2016-10761.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

logitech unifying_receiver_firmware -

Github Repositories

LOGITacker README is still under construction LOGITacker is a hardware tool to enumerate and test vulnerabilities of Logitech Wireless Input devices via RF In contrast to available tooling, it is designed as stand-alone tool This means not only the low level RF part, but also the application part is running on dedicated hardware, which could provides Command Line Interface (C

Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter

Unifying disclosure repo This repository was accessed by a restricted group of reviewers before beeing opened to public (including Logitech staff) The content is mostly left untouched Most subfolders contain a dedicated README file This repo will be used to discuss recent vulnerabilities in Logitech Unifying technology, as well to share and discuss related proof-of-concept co

Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.

LOGITacker README is still under construction LOGITacker is a hardware tool to enumerate and test vulnerabilities of Logitech Wireless Input devices via RF In contrast to available tooling, it is designed as stand-alone tool This means not only the low level RF part, but also the application part is running on dedicated hardware, which could provides Command Line Interface (C

LOGITacker README is still under construction LOGITacker is a hardware tool to enumerate and test vulnerabilities of Logitech Wireless Input devices via RF In contrast to available tooling, it is designed as stand-alone tool This means not only the low level RF part, but also the application part is running on dedicated hardware, which could provides Command Line Interface (C

Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.

LOGITacker README is still under construction LOGITacker is a hardware tool to enumerate and test vulnerabilities of Logitech Wireless Input devices via RF In contrast to available tooling, it is designed as stand-alone tool This means not only the low level RF part, but also the application part is running on dedicated hardware, which could provides Command Line Interface (C

Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.

LOGITacker README is still under construction LOGITacker is a hardware tool to enumerate and test vulnerabilities of Logitech Wireless Input devices via RF In contrast to available tooling, it is designed as stand-alone tool This means not only the low level RF part, but also the application part is running on dedicated hardware, which could provides Command Line Interface (C