Skip to content

Commit

Permalink
Typos
Browse files Browse the repository at this point in the history
  • Loading branch information
mame82 authored Jul 3, 2019
1 parent 293fdc8 commit 087dac8
Showing 1 changed file with 3 additions and 1 deletion.
4 changes: 3 additions & 1 deletion logitech_vuln_summary.md
Original file line number Diff line number Diff line change
Expand Up @@ -183,7 +183,7 @@ decrypt keyboard input remotely (passive). This applies to all encrypted Unifyin
injection attack, as the address is pre-known from the extraction (targeted attack possible, actual device doesn't have
to be in range - only the receiver)

Logitech confirmed, that no patch will be provided for this new vulnerability in August 2019.
Logitech confirmed, that a patch will be provided for this new vulnerability in August 2019.

### References

Expand Down Expand Up @@ -219,6 +219,8 @@ On Microsoft Windows operating systems, this "key blacklisting" protection could
shortcuts, which produce arbitrary ASCII characters as output. From an attacker's perspective this eliminates the need
to obtain the keyboard layout used by the target, as the shortcut based approach is language independent.

Logitech only confirmed to fix the key exteaction vulnerability. There is no information on planned Mitigations for the key filter bypass.

Devices known to be affected are:
- Logitech R500
- Logitech SPOTLIGHT
Expand Down

0 comments on commit 087dac8

Please sign in to comment.