The third one relates to overcoming the barriers to keystroke injection between the device and the USB receiver.Ī person trying to replicate these would need expertise and special equipment and to be within 10m range. Two of them relate to extracting the encryption key that secures the communication between the Logitech device and the Logitech Unifying USB receiver. Q: What are the vulnerabilities reported by the security researcher?Ī: Three potential vulnerabilities were reported. We take our customers’ privacy very seriously, and these findings help us to continually improve our products.
Logitech unifying software marked as a virus update#
We will update this post as soon as it becomes available for download! We are actively working on a firmware update that will address one of the vulnerabilities and expect it to be available for download in August, 2019. People who are concerned about their privacy should take note of and apply the computing security measures described in the Q&A below. The vulnerabilities would require special equipment and skills, as well as proximity to - or even physical access to - the target’s computer or device. We’d like to first reassure you that this research was conducted in a controlled environment. We have been in communication with him since to assess the risks associated with these findings and ways of addressing them. Enterprise customers: You can download a centrally deployable tool for PC here: (Mac support will be added shortly)Įarlier this year a security researcher approached Logitech regarding three potential vulnerabilities related to Logitech’s Unifying Receiver.For PC or Mac users: You can download a simple updating tool here:.