CVE-2019-9835
Published Mar 15, 2019
Last updated 4 years ago
Overview
- Description
- The receiver (aka bridge) component of Fujitsu Wireless Keyboard Set LX901 GK900 devices allows Keystroke Injection. This occurs because it accepts unencrypted 2.4 GHz packets, even though all legitimate communication uses AES encryption.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 9.6
- Impact score
- 6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 6.4
- Exploitability score
- 6.5
- Vector string
- AV:A/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:lx901:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FE80A378-5919-4C19-8881-454E4BF4A208" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:lx901_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CEC1951-A461-4F87-9C94-019B3F4B87E5" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:gk900:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8652EE2E-461D-4007-86BB-F3BCA215AF20" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:gk900_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF659B0E-33A5-490F-B96F-9420EB68B850" } ], "operator": "OR" } ], "operator": "AND" } ]