The Microsoft wireless keyboard uses XOR encryption with a key derived from the MAC address, which makes it easier for remote attackers to obtain keystroke information and inject arbitrary commands via a nearby wireless device, as demonstrated by Keykeriki 2.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2010-03-29T22:00:00
Updated: 2024-08-07T01:14:06.640Z
Reserved: 2010-03-29T00:00:00
Link: CVE-2010-1184
Vulnrichment
No data.
NVD
Status : Modified
Published: 2010-03-29T22:30:00.377
Modified: 2017-08-17T01:32:17.197
Link: CVE-2010-1184
Redhat
No data.