Content deleted Content added
m Each peripheral device can pair to one receiver per profile. While most peripherals only store one profile |
m Reverted edit by Sayyam Malik (talk) to last version by 86.252.255.106 |
||
(45 intermediate revisions by 38 users not shown) | |||
Line 1:
{{Short description|USB wireless receiver}}
[[File:Logitech_unifying_receiver.jpg|thumb|right|Logitech Unifying receiver ( [[File:Logitech_Unifying_Receiver_USB.jpg|thumb|right|Logitech Unifying receiver (
[[File:Unifying.webp|alt=Unifying Logo|thumb|Unifying logo]]
The '''Logitech Unifying receiver''' is an extremely small dedicated [[USB]] wireless receiver, based on the nRF24L-family of RF devices,<ref name="mousejack">{{cite web▼
▲The '''Logitech Unifying
| title=MouseJack device discovery and research tools
| url=https://github.com/BastilleResearch/mousejack#flash-a-logitech-unifying-dongle
| first=Marc
| last=Newlin
| website=[[GitHub]]
| date=2016-08-07
| accessdate=2019-07-25}}</ref> that allows up to six compatible [[Logitech]] human interface devices (such as mice, trackballs,
| last=Gallegos
| first=Gary
Line 14 ⟶ 18:
| archiveurl=https://web.archive.org/web/20160304073820/http://www.gadgetstreet.com/gadgets-the-logitech-unifying-receiver-aka-fake-bluetooth/
| archivedate=4 March 2016
| url-status=dead}}</ref> Peripherals remain paired, and can then be used on systems not supporting the software. Logitech receivers compatible with the Unifying protocol can be identified by the orange Unifying logo, which
Logitech Unifying
A newer receiver named "Logitech Bolt" was released in 2021 that promises lower latency but is incompatible with Unifying products.
==Compatibility and use==
Each peripheral device can pair to one receiver per profile. While most peripherals only store one profile, newer products such as the Logitech MX Master, MX Anywhere series, and M720 Triathlon
Some older Unifying devices {{Specify|date=October 2024|reason=Which devices? How old?}} limit the number of allowable pairing changes to a maximum of 45 times. Once the 45th connection is made, it is no longer possible to connect such a device to a different receiver. For users who often switch a Unifying device between multiple PCs or laptops with individual receivers, this connection limit can become an issue. For example, a user who frequently switches a mouse between two receivers (e.g. at work and home) will quickly exhaust the limit of available pairing switches.<ref>{{cite web
| title=Limitations on Unifying devices
| url=https://support.logi.com/hc/en-us/articles/360023187214
| archiveurl=https://web.archive.org/web/20190710134058/https://support.logi.com/hc/en-us/articles/360023187214
| archivedate=2019
| url-status=live
| accessdate=2019-07-25}}</ref> Logitech advises customers with this issue to contact their Customer Care. Newer devices can switch pairings an unlimited number of times.
Pairing software is available from Logitech for
| title=HID: Add full support for Logitech Unifying
| author=Nestor Lopez Casado
| date=2011-09-15
Line 40 ⟶ 44:
Software to manage Unifying devices on Linux is available from third party developers, such as Solaar.<ref>{{GitHub|pwr-Solaar/Solaar|Solaar}}</ref>
Many companies have made peripherals that connect via [[USB]] wireless receivers very similar to Logitech's
There are many different hardware versions of the unifying receiver. The most common is used for daily use, and is marked CU-0007 on the metal jacket. CU-0008 is distributed with gaming devices, and features lower latency.
== Security ==
Several security vulnerabilities of the Logitech Unifying
| url=https://github.com/mame82/misc/blob/master/logitech_vuln_summary.md
| title=Summary / Overview of known Logitech wireless peripheral vulnerabilities
| author=mame82
| website=[[GitHub]]
| date=2019-07-09
| accessdate=2019-07-25}}</ref> and patches released.
===
[[Mousejacking|MouseJacking]], first reported by Bastille Networks, Inc.,
* Keystroke injection by
* Forced pairing
Line 135 ⟶ 142:
| first=Marc
| last=Viredaz
| website=[[GitHub]]
| date=2017-12-22
| accessdate=2019-07-25}}</ref>
Line 161 ⟶ 169:
| first=Marc
| last=Viredaz
| website=[[GitHub]]
| date=2017-12-22
| accessdate=2019-07-25}}</ref>
Line 186 ⟶ 195:
| first=Marc
| last=Viredaz
| website=[[GitHub]]
| date=2017-12-22
| accessdate=2019-07-25}}</ref>
Line 203 ⟶ 213:
| first=Marc
| last=Viredaz
| website=[[GitHub]]
| date=2017-12-22
| accessdate=2019-07-25}}</ref>
Line 208 ⟶ 219:
==== Response ====
| url=https://support.logi.com/hc/en-001/community/posts/360032078393-Logitech-Response-to-Research-Findings
| title=Logitech Response to Research Findings
Line 216 ⟶ 227:
| archivedate=2019-07-09
| url-status=live
| accessdate=2019-07-25}}</ref><ref name=2019patch>{{cite web |url=https://support.logi.com/hc/en-us/community/posts/360033207154-Logitech-Unifying-Receiver-Update |title=Logitech Unifying Receiver Update |website=Logitech Support + Download |date=28 August 2019 |author= |access-date=3 October 2019 |archive-date=11 October 2019 |archive-url=https://web.archive.org/web/20191011034356/https://support.logi.com/hc/en-us/community/posts/360033207154-Logitech-Unifying-Receiver-Update |url-status=dead }}</ref>
Linux users can use [[fwupd]] to flash an updated firmware. It will automatically detect available updates for any connected unifying receivers and many other firmware updatable devices. An outdated alternative is ''MouseJack''.<ref name="mousejack"/>
For Linux users there are native options to flash and experiment with such as [[fwupd]] and ''MouseJack''.<ref name="mousejack"/> However, with these tools a separate firmware binary is still required. Flashing on a Linux host via a hypervisor such as [[VirtualBox]] along with a Windows virtual guest image and the Windows Logitech update executable is also possible. If using a Windows virtual guest, it is recommended to have a second available pointing device while the dongle is being updated. The second pointing device may be needed to allow the user to select and enable pass through of the unifying receiver via the hypervisor task bar after executing the firmware updater so that the device is found and updated.▼
▲
Updating the Unifying receiver firmware to versions RQR12.08 or greater and RQR24.06 or greater can limit some functionality of certain paired devices unless the devices' firmware is also updated.
Line 224 ⟶ 237:
=== Other vulnerabilities ===
On July 9, 2019 another set of vulnerabilities was disclosed and documented by a different researcher.<ref name=vulerabilities/> A firmware update for Unifying receivers addressing the "Encryption Key Extraction Through USB" vulnerability (CVE-2019-13054/55) was released on 28 August 2019.<ref name=2019patch/> Some users reported in 2019 that some Unifying devices were still being sold that were vulnerable to the original 2016 [[Clickjacking#MouseJack|MouseJacking]] attack.<ref>{{Cite web|url=https://www.theverge.com/2019/7/14/20692471/logitech-mousejack-wireless-usb-receiver-vulnerable-hack-hijack|title=Why you should really, really update your Logitech wireless dongle|last=Hollister|first=Sean|date=2019-07-14|website=The Verge|language=en|access-date=2020-01-02}}</ref>
== See also ==
Line 235 ⟶ 248:
== External links ==
* [https://
{{Logitech}}
|