You can be hacked through your Logitech product.
When you buy a wireless keyboard or a wireless mouse from Logitech, you are welcome to use a wireless USB receiver.
You can be hacked through your Logitech product.
When you buy a wireless keyboard or a wireless mouse from Logitech, you are welcome to use a wireless USB receiver.
This plugs you into your computer, allowing communication between devices.
"MouseJack" still lives
Already in 2016, it was discovered that these USB receivers were vulnerable to hacker attacks.
The vulnerabilities became known as "MouseJack", and Logitech ended up launching a patch that was supposed to close the hole.
But now, new vulnerabilities have been revealed that can be exploited in several of Logitech's USB receivers. It emerges from a summary published on GitHub by security researcher Marcus Meng.
The vulnerabilities apply to Logitech's Unifying receivers, and first and foremost, those that can be linked to presentation remote controls.
The case continues under the picture.
The sale was never stopped
But that's not the most disturbing thing: Meng claims that Logitech still sells several of the USB receivers which proved to be vulnerable in 2016. The Verge has been in contact with the company, which confirms this.
"Logitech evaluated the risks for businesses and consumers and did not revoke products or components that were already in the market and supply chain. We made the firmware update available to all customers who were particularly concerned and implemented changes to products that were produced later, "the company said in a statement to the site.
May apply to several manufacturers
It's not just Logitech's products that are potentially affected by this security error. Products from other manufacturers, such as HP, Lenovo, and Microsoft, may also be at risk as long as they use the same chip and firmware as Logitech.
Update now
In any case, it may be worthwhile updating the firmware of your Logitech USB receiver. It can be done from here.