Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Issue with C-U0008 #23

Open
yiu-hongsum opened this issue Sep 25, 2019 · 2 comments
Open

Issue with C-U0008 #23

yiu-hongsum opened this issue Sep 25, 2019 · 2 comments

Comments

@yiu-hongsum
Copy link

yiu-hongsum commented Sep 25, 2019

Is there a different instruction set for U0008 and U0012? I only have 1 0007 and I cant seem to get 0008 to work. The script get transmitted but nothing executes on my victim end. The receiver is out of box version.

Is there a way to flash the vulnerable firmware into the receiver?

@mame82
Copy link
Collaborator

mame82 commented Sep 27, 2019

It doesn't depend on the Unifying receiver, but on the firmware version, which kinds of vulnerability exists.

Rule of thumb:
Only the oldest Unifying receiver firmwares accept plain injection (MouseJack). But, also the newest firmware accept injection, if the encryption key is known, because

a) pairing of a keyboard was sniffed with LOGITacker (CVE-2019-13052)
b) the key was dumped with munifying (receiver is vulnerable to CVE-2019-13055) and manually added to LOGITacker.

For details on patched vulnerabilities across different firmware versions, see the respective READMEs in Logitech's repo (CU0007 is RQR12, CU0008/0016 is RQR24):

https://github.com/Logitech/fw_updates/tree/update2019-08-27/RQR12

@antonowicz
Copy link

@mame82 is there some repo with older versions of firmware (vulnerable) for attack?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants