, 7 tweets, 2 min read Read on Twitter
Fujitsu wireless keyboard model vulnerable to keystroke injection attacks

Affected keyboard is the Fujitsu LX901 line

Here's a demo of the attack.

The keyboard's wireless encryption is just fine.

The vulnerability exists because developer blunder. A Fujitsu dev forgot to remove a demo design kit from the keyboard's USB receiver.

This kit accepts unencrypted packets, which means you can inject any keystrokes you like
Developer told me he contacted Fujitsu but the company stopped any communications last fall.

Chances for a patch are slim, as the company didn't patch a previous 2016 issue he reported in the same keyboard: syss.de/fileadmin/doku…
If you combine both flaws, you get your own Fujitsu-wireless-keyboard-pwning-drive-by-attack-rig.

But here's the funny part. In the reply to the 2016 bug report, Fujitsu said the keyboards were never meant to be secure
As the security researcher told me, users shouldn't be using wireless keyboards to begin with.

They're not safe!

They may be convenient in some scenarios, but they're not safe for the enterprise, government, public spaces, or if you have sensitive data on a particular machine
Did you see me bury a story at Friday evening, 8pm US time? This is probably the fourth week in a row I do this.

I deserve some kind of moron journalist of the year award
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Catalin Cimpanu
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!