First published: Fri Mar 15 2019(Updated: )
The receiver (aka bridge) component of Fujitsu Wireless Keyboard Set LX901 GK900 devices allows Keystroke Injection. This occurs because it accepts unencrypted 2.4 GHz packets, even though all legitimate communication uses AES encryption.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fujitsu Lx901 Firmware | ||
Fujitsu Lx901 | ||
Fujitsu Gk900 Firmware | ||
Fujitsu Gk900 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2019-9835.
The severity level of CVE-2019-9835 is critical (9.6).
The affected software of CVE-2019-9835 is Fujitsu Wireless Keyboard Set LX901 GK900 devices.
The vulnerability CVE-2019-9835 occurs because the receiver component of Fujitsu Wireless Keyboard Set LX901 GK900 devices accepts unencrypted 2.4 GHz packets.
Yes, there are references available for CVE-2019-9835. You can find them at http://www.securityfocus.com/bid/107440 and https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-033.txt.