First published: Thu Oct 24 2019(Updated: )
An issue was discovered on Fujitsu Wireless Keyboard Set LX390 GK381 devices. Because of the lack of proper encryption of 2.4 GHz communication, and because of password-based authentication, they are vulnerable to replay attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fujitsu Lx390 Firmware | ||
Fujitsu Lx390 | =gk381 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18199 is a vulnerability found in Fujitsu Wireless Keyboard Set LX390 GK381 devices that makes them vulnerable to replay attacks due to the lack of proper encryption and password-based authentication.
CVE-2019-18199 affects Fujitsu Wireless Keyboard Set LX390 GK381 devices by exposing them to replay attacks, compromising the security of the device.
CVE-2019-18199 is considered a medium severity vulnerability with a severity value of 6.6.
To fix CVE-2019-18199 on your Fujitsu Wireless Keyboard Set LX390 GK381 device, it is recommended to update the firmware of the device to a version that addresses the vulnerability.
More information about CVE-2019-18199 can be found at the following references: - [Packet Storm Security](http://packetstormsecurity.com/files/154954/Fujitsu-Wireless-Keyboard-Set-LX390-Replay-Attacks.html) - [SYSS Advisory](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-009.txt) - [SYSS Pentest Blog](https://www.syss.de/pentest-blog/2019/syss-2019-009-syss-2019-010-und-syss-2019-011-schwachstellen-in-weiterer-funktastatur-mit-sicherer-24-ghz-technologie/)