![]() ![]() ![]() A researcher from Google’s Project Zero discovered a critical vulnerability in the software for Logitech keyboards and mouses. As a workaround, Logitech Options users should uninstall the software. With no patch or fix in sight, the issue can be easily exploited. The vulnerability was discovered by Google Project Zero security researcher Tavis Ormandy. He found that the Logitech Options software opens a local websockets port which takes commands without authentication reports myce.Īttackers could exploit this issue by sending simulated keystrokes from any website and thus execute pretty much anything on affected systems. Ormandy discovered the issue when he installed the software to configure the buttons of his mouse on Windows. The 150 MB large application automatically starts when Windows starts and then also opens the vulnerable port on which a websockets service runs. Websites can communicate directly with the websockets service and because there is no authentication, it will accept any command it receives. Only one small security measure could stop a possible attack but is easily bypassed, as Ormandy explains, “the only “authentication” is that you have to provide a pid of a process owned by your user, but you get unlimited guesses so you can brute force it in microseconds.” Even worse, the software also doesn’t check where the commands originate from, which means it will accept any commands from any website. Logi Options+ is the powerful, easy-to-use, next-gen application that enables customization for Logitech mice and keyboards so you can work how you want. Ormandy reported the issues to Logitech developers in September this year and although they assured him they understood the problem, the last release of the software still didn’t contain a proper fix. As part of Google Project Zero’s responsible disclosure policy, Logitech was given a 90-day deadline to fix the issue.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |