CVE-2019-18199

An issue was discovered on Fujitsu Wireless Keyboard Set LX390 GK381 devices. Because of the lack of proper encryption of 2.4 GHz communication, and because of password-based authentication, they are vulnerable to replay attacks.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:fujitsu:lx390_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:fujitsu:lx390:gk381:*:*:*:*:*:*:*

History

21 Nov 2024, 04:32

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/154954/Fujitsu-Wireless-Keyboard-Set-LX390-Replay-Attacks.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/154954/Fujitsu-Wireless-Keyboard-Set-LX390-Replay-Attacks.html - Exploit, Third Party Advisory, VDB Entry
References () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-009.txt - Exploit, Third Party Advisory () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-009.txt - Exploit, Third Party Advisory
References () https://www.syss.de/pentest-blog/2019/syss-2019-009-syss-2019-010-und-syss-2019-011-schwachstellen-in-weiterer-funktastatur-mit-sicherer-24-ghz-technologie/ - Third Party Advisory () https://www.syss.de/pentest-blog/2019/syss-2019-009-syss-2019-010-und-syss-2019-011-schwachstellen-in-weiterer-funktastatur-mit-sicherer-24-ghz-technologie/ - Third Party Advisory

Information

Published : 2019-10-24 14:15

Updated : 2024-11-21 04:32


NVD link : CVE-2019-18199

Mitre link : CVE-2019-18199

CVE.ORG link : CVE-2019-18199


JSON object : View

Products Affected

fujitsu

  • lx390
  • lx390_firmware
CWE
CWE-319

Cleartext Transmission of Sensitive Information