cve/2019/CVE-2019-18199.md

20 lines
995 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-18199](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18199)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was discovered on Fujitsu Wireless Keyboard Set LX390 GK381 devices. Because of the lack of proper encryption of 2.4 GHz communication, and because of password-based authentication, they are vulnerable to replay attacks.
### POC
#### Reference
- http://packetstormsecurity.com/files/154954/Fujitsu-Wireless-Keyboard-Set-LX390-Replay-Attacks.html
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-009.txt
- https://www.syss.de/pentest-blog/2019/syss-2019-009-syss-2019-010-und-syss-2019-011-schwachstellen-in-weiterer-funktastatur-mit-sicherer-24-ghz-technologie/
#### Github
No PoCs found on GitHub currently.