Logitech Unifying receiver: Difference between revisions

Content deleted Content added
wording. del unrefd opinion
Security: A firmware update for Unifying receivers addressing the "Encryption Key Extraction Through USB" vulnerability (CVE-2019-13054/55) was released on 28 August 2019.<ref name=2019patch/>
Line 44:
== Security ==
 
Several security vulnerabilities of the Logitech Unifying software and devices using itsystem have been reported.,<ref name=vulerabilities>{{cite web
| url=https://github.com/mame82/misc/blob/master/logitech_vuln_summary.md
| title=Summary / Overview of known Logitech wireless peripheral vulnerabilities
| author=mame82
| date=2019-07-09
| accessdate=2019-07-25}}</ref> and patches released.
 
=== Mousejacking and keyjacking ===
Line 208:
 
==== Response ====
In 2016 Logitech responded with ahas fewreleased Unifying receiver firmware updates as new exploits were reported.<ref>{{cite web
| url=https://support.logi.com/hc/en-001/community/posts/360032078393-Logitech-Response-to-Research-Findings
| title=Logitech Response to Research Findings
Line 216:
| archivedate=2019-07-09
| url-status=live
| accessdate=2019-07-25}}</ref><ref name=2019patch>{{cite web |url=https://support.logi.com/hc/en-us/community/posts/360033207154-Logitech-Unifying-Receiver-Update |title=Logitech Unifying Receiver Update|website=Logitech Support + Download |date=28 August 2019|author=}}</ref>
| accessdate=2019-07-25}}</ref>
 
For Linux users there are native options to flash and experiment with such as [[fwupd]] and ''MouseJack''.<ref name="mousejack"/> However, with these tools a separate firmware binary is still required. Flashing on a Linux host via a hypervisor such as [[VirtualBox]] along with a Windows virtual guest image and the Windows Logitech update executable is also possible. If using a Windows virtual guest, it is recommended to have a second available pointing device while the dongle is being updated. The second pointing device may be needed to allow the user to select and enable pass through of the unifying receiver via the hypervisor task bar after executing the firmware updater so that the device is found and updated.
Line 224:
=== Other vulnerabilities ===
 
On July 9, 2019 another set of vulnerabilities was disclosed and documented by a different researcher.<ref name=vulerabilities/> FirmwareA fixesfirmware update for Unifying receivers addressing the new"Encryption vulnerabilitiesKey haveExtraction notThrough beenUSB" vulnerability (CVE-2019-13054/55) was released on 28 August 2019.<ref name=2019patch/>
 
== See also ==