Logitech Options App Vulnerability Could Allow Keystroke Injection Attacks
Logitech has recently released a rushed update to its Options app. The company didn’t reveal explicitly what the bug fixes, however a researcher from Google’s Project Zero has disclosed the matter. Allegedly, he discovered and reported a Logitech Options app vulnerability to the officials that could trigger keystroke injections. However, since the vendors didn’t do anything, he eventually disclosed the flaw publicly.
Logitech Options App Vulnerability Triggering Hacks
Reportedly, a researcher from Google’s Project Zero team pointed out a security flaw in Logitech’s app named ‘Options’. The flaw could allow an attacker to exploit keystroke injection attacks on a targeted device. Options is a dedicated app by Logitech that offers customization options in the firm’s mouse, touchpads, and keyboards.
The researcher Tavis Ormandy shared the details of his findings in a separate bug report. Describing the Logitech Options app vulnerability, he stated,
“That program spawns multiple subprocesses and appears to be an electron app. It also opens a websocket server on port 10134 that any website can connect to, and has no origin checking at all. Trying to figure out what this websocket server does, it’s immediately obvious that it expects JSON messages, and there is zero type checking of properties, so it crashes like crazy.”
After noticing the problem, he worked out to discover the ease of brute forcing the user’s authentication PID. Once an attacker guessed the PID, it became easier to execute commands and configure “crown” to send arbitrary keystrokes. These keystroke attacks could eventually let an attacker take complete control of the target system.
Logitech Rushed To Release Update – But, Has It Patched The Bug?
The researcher discovered the flaw in September as evident from his bug report dated September 12, 2018. He also mentioned in the report that he informed Logitech about the flaw. Allegedly, he even met the Logitech engineers on September 18, 2018, who assured him they would address the matter.
However, after witnessing no significant action from the vendors in this connection, Ormandy disclosed the news publicly. As he said,
“This is now past deadline, so making public.”
After his report surfaced online on December 11, 2018, Logitech rushed to release the update 7.00.564 on December 13, 2018. However, it is still unclear if this update patches the vulnerability referred herewith. Although, Logitech stated in a tweet that the update addresses this flaw.
Nonetheless, a user mentioned in response to Ormandy’s report that he could still reproduce the error.
“I have tested this before and after updating to 7.0.564 and I could still reproduce the issue. Looks like Logitech has not fixed the issue yet.”
For now, Logitech hasn’t revealed any explicit details about how they patched the bug.
source latesthackingnews
Industry: Cyber Security News
Latest Jobs
-
- Senior Data Privacy Consultant. Client Facing | London
- London
- N/A
-
Senior Data Privacy Consultant. Client Facing | London Senior Data Privacy Consultant needed for a key client facing opportunity. Must be willing to undergo SC Security Clearance. Hybrid role- onsite with customer / office 2-3 days a week. London Key Responsibilities: Lead and support client facing data privacy projects. Assess compliance, define and deliver strategic projects / implement privacy solutions. Manage project teams and develop business opportunities. Required Experience: Experience in data protection and privacy standards. Background in consulting. Skills and Qualifications: Business consulting experience IAPP Privacy Manager / Privacy Technologist Location Greater London UK based role. Not able to provide VISA sponsorship.
-
- Security Analyst - Internal role. London commutable. Permanent
- London
- N/A
-
Security Analyst - Internal role. London commutable opportunity. Operational Security - Investigate, escalate and proactively work to ensure household name remains protected. Project Security - Coordinate, log change requests with project delivery teams to meet security requirements Policy / compliance - work with team to aid in uplifting these as and where needed This role is role to investigate, escalate and proactively work to protect a globally recognised brand. You must have current hands on operational analytical security experience with Microsoft technology stack Someone with a SOC Analyst / security engineering background would be well suited. This position will join a small team and would suit someone that has broad experience across the security threat landscape. Experience / knowledge across industry GRC standards such NIST, ISO27001 etc very advantageous and a priority. You will work across multiple teams proactively working to secure the business. Must be able to commute to Central London 3 days a week. Visa sponsorship not available Apply today to find out more.
-
- Network / Security Infrastructure Engineer | West London | Permanent
- London
- N/A
-
Network / Security Infrastructure Engineer | West London | Current Config, Install, upgrade experience On prem / Datacetner experience essential. Hands on experience MUST include: Routing, Switching, Network Security (firewall, IDS etc), Microsoft exchange / Exchange 365. Scripting / automation experience wanted. Python, Powershell etc Regular travel to West London is required. Visa sponsorship not available. Apply today for more information chris.holt@dclsearch.com Use this whatapp link to reach out https://wa.me/message/6USF5RAQBOZIP1
-
- SailPoint File Access Manager Consultant/ Architect
- N/A
- discussed on applications
-
SailPoint File Access Manager (SailPoint FAM) Consultant/ Architect is required for an up coming projects, Ideally looking for someone with experience in Designing and deploying SailPoint FAM , this is a new Deployment, you will work with customer in the initial workshop phase, to understand requirements and to get the initial design, you will then be responsible for deploying the solution. This is a home based role, with some onsite visits required during the length of the project. We are looking for someone who has previous experience in Deploying SailPoint FAM (ideally done design work) Need to have experience with SharePoint and ideally Azure and Share file