0

Is there any way to find out if any of the vulnerabilities of older Logitech Unifying Receiver firmware was exploited? I'm referring to the vulnerabilities listed here including these.

On GNU/Linux/Debian it can be patched with fwupdmgr update but I was never prompted to install these patches (neither in Apper nor in KDE Discover). I'd like to know if there are ways one could try to find out if the vulnerabilities were exploited or if there were attempts to do so. For example, if another device was paired with this successfully wouldn't this show somewhere? Are there logs one could scan for this somehow?


I haven't dived into the descriptions of the vulnerabilities but so far it seems like even if another keyboard was successfully paired or keystroke injection was used for attempts to install some malware that would still require knowledge of the root password, or is that wrong?

Are all of these vulnerabilities only present when one newly pairs a device, not just for example when one turns a device which was already paired in the past on?

mYnDstrEAm
  • 319
  • 2
  • 17

0 Answers0