Permalink
Switch branches/tags
Nothing to show
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
56 lines (24 sloc) 1.04 KB
Bastille Threat Research Team Tracking Number 10
Document version: 1.0
Overview
The Kensington ProFit Wireless Keyboard does not encrypt packets transmitted over the air, making
it possible to sniff keystrokes typed by the user, and inject arbitrary keystrokes into the computer.
Affected Platforms
The following products have been tested and shown to be affected:
- Kensington ProFit Wireless Keyboard
- Kensington USB dongle (USB ID 062a:4101)
Impact
The keyboard and USB dongle communicate using an unencrypted wireless protocol, making it possible
to sniff keystrokes and inject malicious keystrokes.
Mitigation
Exploiting this vulnerability involves wirelessly communicating with a USB dongle, which requires
physical proximity to the target computer.
Suggested Solutions
No solution available for recommendation.
More Information
https://www.keysniffer.net/
Test Environment
Packet sniffing and injection were tested using a nRF24LU1+ based USB dongle to transmit RF packets
to a Kensington USB dongle.
Credits
Marc Newlin