Logitech Wireless Peripheral Device Man in the Middle Vulnerability

A problem with Logitech wireless mice and keyboards make it possible for a remote users to gain unauthorized access to resources. It is possible for a user with equipment capable of monitoring the frequencies used to communicate between the base receiver and devices to watch the session. Additionally, a user with similar equipment that has been altered may be able to gain control of the session.

This problem makes it possible for a remote user to gain console access to an unauthorized system, either by watching keystrokes, or by session hijacking.


Privacy Statement
Copyright 2010, SecurityFocus