
- Setpoint logitech unifying software how to#
- Setpoint logitech unifying software code#
- Setpoint logitech unifying software plus#
Logitech's Unifying wireless standard allows for up to six compatible input devices to be used with a single Unified receiver – from ten-year-old models to the latest series. A complete fix would likely jeopardize compatibility between Unifying products. Logitech plans to resolve only some of the security issues reported by Mengs, but not all.
Setpoint logitech unifying software plus#
The Logitech K400 Plus living room keyboard comes with a unifying receiver. Bild 1 von 7 Logitech products with Unifying technology (7 Bilder) Unfortunately, they suffer from a previously discovered issue known as MouseJack. The Presenter R400, R700 and R800, however, are not affected by the vulnerabilities described in this article. In addition, wireless gaming products of the Lightspeed series and the Wireless Presenters R500 and Spotlight are also affected. The vulnerable USB receivers are recognized by a small orange star logo. Unifying is used across Logitech's product range, from inexpensive entry level devices to current high-end models. Logitech has been shipping the vulnerable Unifying USB receivers with wireless keyboards and mice since 2009. The Logitech Unifying receivers are recognizable by their orange star logo.Īny Logitech device that uses the so-called Unifying radio technology is affected. The company confirmed Marcus Mengs' reports and attempted to clarify the situation. – Quelle: Marcus Mengs evaluated the security expert's extensive reports and then discussed the individual vulnerabilities with Art O'Gnimh, global head of Logitech's mouse and keyboard division, in a video conference convened on short notice.

– Security expert Marcus Mengs installs a backdoor through a vulnerable Logitech Spotlight presenter That means even computers who are not online are ripe for the hack.īei Problemen mit der Wiedergabe des Videos aktivieren Sie bitte JavaScript In a way, it's an elegant hack, because he simply piggybacks on the wireless Logitech connection to infect the system and to communicate with the backdoor.
Setpoint logitech unifying software how to#
Mengs demonstrates how to infect a system with a backdoor (remote shell) through which he can control the system remotely by radio.
Setpoint logitech unifying software code#
And that makes it easy to infect the computer with malicious code without the rightful owner taking notice. But it gets worse: An attacker can send any command to the victim's computer if a vulnerable Logitech-device is installed. Everything an affected user types, from e-mails to passwords, is readily available to the adversary. The vulnerabilities allow an attacker to eavesdrop on keystrokes from wireless keyboards. They affect keyboards and mice as well as remote controls known as wireless presenters. Mengs investigation of the wireless connections of several Logitech devices has uncovered numerous weaknesses. That is the conclusion of security expert Marcus Mengs, with whom c't has been in touch for quite some time.

A large range of Logitech wireless input devices is vulnerable to wireless attacks and can pose a security risk.
