Permalink
Switch branches/tags
Nothing to show
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
56 lines (24 sloc) 1.04 KB
Bastille Threat Research Team Tracking Number 10
Document version: 1.0
Overview
The Insignia Wireless Keyboard NS-PNC5011 does not encrypt packets transmitted over the air, making
it possible to sniff keystrokes typed by the user, and inject arbitrary keystrokes into the computer.
Affected Platforms
The following products have been tested and shown to be affected:
- Insignia Wireless Keyboard NS-PNC5011
- Insignia USB dongle (USB ID 3938:1032)
Impact
The keyboard and USB dongle communicate using an unencrypted wireless protocol, making it possible
to sniff keystrokes and inject malicious keystrokes.
Mitigation
Exploiting this vulnerability involves wirelessly communicating with a USB dongle, which requires
physical proximity to the target computer.
Suggested Solutions
No solution available for recommendation.
More Information
https://www.keysniffer.net/
Test Environment
Packet sniffing and injection were tested using a nRF24LU1+ based USB dongle to transmit RF packets
to an Insignia USB dongle.
Credits
Marc Newlin