Guru3D.com
  • HOME
  • NEWS
    • Channels
    • Archive
  • DOWNLOADS
    • New Downloads
    • Categories
    • Archive
  • GAME REVIEWS
  • ARTICLES
    • Rig of the Month
    • Join ROTM
    • PC Buyers Guide
    • Guru3D VGA Charts
    • Editorials
    • Dated content
  • HARDWARE REVIEWS
    • Videocards
    • Processors
    • Audio
    • Motherboards
    • Memory and Flash
    • SSD Storage
    • Chassis
    • Media Players
    • Power Supply
    • Laptop and Mobile
    • Smartphone
    • Networking
    • Keyboard Mouse
    • Cooling
    • Search articles
    • Knowledgebase
    • More Categories
  • FORUMS
  • NEWSLETTER
  • CONTACT

New Reviews
Netac NV7000 2 TB NVMe SSD Review
ASUS GeForce RTX 4080 Noctua OC Edition review
MSI Clutch GM51 Wireless mouse review
ASUS ROG STRIX B760-F Gaming WIFI review
Asus ROG Harpe Ace Aim Lab Edition mouse review
SteelSeries Arctis Nova Pro Headset review
Ryzen 7800X3D preview - 7950X3D One CCD Disabled
MSI VIGOR GK71 SONIC Blue keyboard review
AMD Ryzen 9 7950X3D processor review
FSP Hydro G Pro 1000W (ATX 3.0, 1000W PSU) review

New Downloads
Intel ARC graphics Driver Download Version: 31.0.101.4148
GeForce 531.29 WHQL driver download
CrystalDiskInfo 9.0.0 Beta3 Download
AMD Ryzen Master Utility Download 2.10.2.2367
AMD Radeon Software Adrenalin 23.3.1 WHQL download
Display Driver Uninstaller Download version 18.0.6.1
CPU-Z download v2.05
AMD Chipset Drivers Download 5.02.19.2221
GeForce 531.18 WHQL driver download
ReShade download v5.7.0


New Forum Topics
Negative LOD Bias and DLSS Raja Koduri, Chief Architect of Intel's GPU Division, Leaves Intel 3080 Ti owners advised to avoid Diablo 4 if their card has AOZ5312UQI buck controller. Review: MSI Clutch GM51 Wireless Mouse GPU Crashing Vulkan Beta Driver 531.46 AMD Software: Adrenalin Edition 23.3.2 WHQL - Driver Download and Discussion NVIDIA GeForce 531.29 WHQL driver Download & Discussion ACER adds two New Full HD 100Hz Liquid Crystal Displays at a low price MSI Afterburner and Unwinder




Guru3D.com » News » Vulnerability: Logitech Options users should uninstall immediately (updated)

Vulnerability: Logitech Options users should uninstall immediately (updated)

by Hilbert Hagedoorn on: 12/14/2018 09:41 AM | source: myce | 23 comment(s)
Vulnerability: Logitech Options users should uninstall immediately (updated)

A researcher from Google’s Project Zero discovered a critical vulnerability in the software for Logitech keyboards and mouses. As a workaround, Logitech Options users should uninstall the software. With no patch or fix in sight, the issue can be easily exploited.

The vulnerability was discovered by Google Project Zero security researcher Tavis Ormandy. He found that the Logitech Options software opens a local websockets port which takes commands without authentication reports myce.

Attackers could exploit this issue by sending simulated keystrokes from any website and thus execute pretty much anything on affected systems.

Ormandy discovered the issue when he installed the software to configure the buttons of his mouse on Windows. The 150 MB large application automatically starts when Windows starts and then also opens the vulnerable port on which a websockets service runs. Websites can communicate directly with the websockets service and because there is no authentication, it will accept any command it receives. Even worse, the software also doesn’t check where the commands originate from, which means it will accept any commands from any website.

Only one small security measure could stop a possible attack but is easily bypassed, as Ormandy explains, “the only “authentication” is that you have to provide a pid [process ID]  of a process owned by your user, but you get unlimited guesses so you can brute force it in microseconds.”

Ormandy reported the issues to Logitech developers in September this year and although they assured him they understood the problem, the last release of the software still didn’t contain a proper fix. As part of Google Project Zero’s responsible disclosure policy, Logitech was given a 90-day deadline to fix the issue. That deadline now expired and the issue is therefore now publicly disclosed.

Users who have Logitech Options installed should uninstall the software immediately, it will be very easy for attackers to exploit this issue and any visited website is a security risk when the software runs on the computer.


Update: Logitech is now offering an updated version of their Options software that fixes the vulnerabiity. Please download the updated version from here.



Vulnerability: Logitech Options users should uninstall immediately (updated)




« The Hunt - Cyberpunk 4K · Vulnerability: Logitech Options users should uninstall immediately (updated) · Intel B365: New chipset is similar to Z170 at 22nm manufacturing »

5 pages 1 2 3 4 5


TheDeeGee
Senior Member



Posts: 8634
Joined: 2010-08-28

#5617280 Posted on: 12/14/2018 09:58 AM
Gonna take the risk and leave it installed, i use macro's daily.

After all i'm using a 4770K which looks like a cheese slope with giant holes anyways.

B-linq
Junior Member



Posts: 13
Joined: 2018-09-26

#5617288 Posted on: 12/14/2018 10:09 AM
A few days ago I bought several of these to our office :/

sverek
Junior Member



Posts: 6070
Joined: 2011-01-02

#5617290 Posted on: 12/14/2018 10:14 AM
A few days ago I bought several of these to our office :/

Are you gaming in your office? :D

B4rm1nc
Junior Member



Posts: 2
Joined: 2018-12-14

#5617292 Posted on: 12/14/2018 10:20 AM
A few days ago I bought several of these to our office :/


It's not which type of mouse you are using, but the software itself that is the issue here.

ontelo
Member



Posts: 84
Joined: 2003-07-08

#5617294 Posted on: 12/14/2018 10:22 AM
Does this concern the Logitech Gaming Software or only the Logitech Options software?

5 pages 1 2 3 4 5


Post New Comment
Click here to post a comment for this news story on the message forum.


Guru3D.com © 2023