The Microsoft wireless keyboard uses XOR encryption with a key derived from the MAC address, which makes it easier for remote attackers to obtain keystroke information and inject arbitrary commands via a nearby wireless device, as demonstrated by Keykeriki 2.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2010-03-29T22:00:00

Updated: 2024-08-07T01:14:06.640Z

Reserved: 2010-03-29T00:00:00

Link: CVE-2010-1184

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2010-03-29T22:30:00.377

Modified: 2017-08-17T01:32:17.197

Link: CVE-2010-1184

cve-icon Redhat

No data.