6.5
CVSSv3

CVE-2019-13054

Published: 29/06/2019 Updated: 24/08/2020
CVSS v2 Base Score: 3.3 | Impact Score: 2.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 297
Vector: AV:A/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The Logitech R500 presentation clicker allows malicious users to determine the AES key, leading to keystroke injection. On Windows, any text may be injected by using ALT+NUMPAD input to bypass the restriction on the characters A through Z.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

logitech r500_firmware -

Github Repositories

LOGITacker README is still under construction LOGITacker is a hardware tool to enumerate and test vulnerabilities of Logitech Wireless Input devices via RF In contrast to available tooling, it is designed as stand-alone tool This means not only the low level RF part, but also the application part is running on dedicated hardware, which could provides Command Line Interface (C

munifying by Marcus Mengs (@MaMe82) The tool munifying could be used to interact with Logitech receivers from USB side (not RF) This tool was developed during vulnerability research and is provided as-is The main purpose of munifying is the demonstration of the extraction of AES link encryption keys and device RF addresses of paired devices from a Logitech receiver dongle via

Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter

Unifying disclosure repo This repository was accessed by a restricted group of reviewers before beeing opened to public (including Logitech staff) The content is mostly left untouched Most subfolders contain a dedicated README file This repo will be used to discuss recent vulnerabilities in Logitech Unifying technology, as well to share and discuss related proof-of-concept co

Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.

LOGITacker README is still under construction LOGITacker is a hardware tool to enumerate and test vulnerabilities of Logitech Wireless Input devices via RF In contrast to available tooling, it is designed as stand-alone tool This means not only the low level RF part, but also the application part is running on dedicated hardware, which could provides Command Line Interface (C

munifying-web Experimental in-browser implementation of CVE-2019-13054/CVE-2019-13054 from Chrome 78+ The page utilizes the new WebHID API to extract AES encryption keys from vulnerable dongles As this is a PoC, there is no proper error handling implemented The code is supposed to work with Logitech receivers utilizing a Texas Instruments Chip (R500, SPOTLIGHT, LightSpeed Lo

LOGITacker README is still under construction LOGITacker is a hardware tool to enumerate and test vulnerabilities of Logitech Wireless Input devices via RF In contrast to available tooling, it is designed as stand-alone tool This means not only the low level RF part, but also the application part is running on dedicated hardware, which could provides Command Line Interface (C

Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.

LOGITacker README is still under construction LOGITacker is a hardware tool to enumerate and test vulnerabilities of Logitech Wireless Input devices via RF In contrast to available tooling, it is designed as stand-alone tool This means not only the low level RF part, but also the application part is running on dedicated hardware, which could provides Command Line Interface (C

Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.

LOGITacker README is still under construction LOGITacker is a hardware tool to enumerate and test vulnerabilities of Logitech Wireless Input devices via RF In contrast to available tooling, it is designed as stand-alone tool This means not only the low level RF part, but also the application part is running on dedicated hardware, which could provides Command Line Interface (C

munifying by Marcus Mengs (@MaMe82) The tool munifying could be used to interact with Logitech receivers from USB side (not RF) This tool was developed during vulnerability research and is provided as-is The main purpose of munifying is the demonstration of the extraction of AES link encryption keys and device RF addresses of paired devices from a Logitech receiver dongle via