Logitech Unifying

From Deskthority wiki
Revision as of 09:53, 4 July 2020 by Findecanor (talk | contribs) (Blurb about responsiveness)
Jump to navigation Jump to search

This article is a stub. You can help Deskthority by expanding it.

LogitechUnifying.jpg

Logitech's Unifying is a proprietary wireless peripheral protocol on the 2.4 GHz band, introduced in 2009. It can connect up to six compatible Logitech devices to one Unifying receiver, which must be plugged into a USB Type-A port.

Some of Logitech's mice and keyboards with Unifying support also Bluetooth. Users often subjectively perceive that these devices' Bluetooth-mode is less responsive.

Some devices have special keys that would require a proprietary software/driver to use with Microsoft Windows.

Security

Like with Bluetooth, devices use a pairing scheme to connect to host dongles and the traffic is then encrypted.

The system used to be vulnerable to MouseJack attacks[1], but firmware and software updates are supposed to have sealed that vulnerability.

More recently, has been discovered that the encryption key for traffic can be extracted by sniffing radio traffic while pairing, after unplugging and reinserting a dongle while connected (CVE-2019-13052), or by sniffing both radio and USB traffic (CVE-2019-13053). In the later case, only 12 to 20 keystrokes are necessary. Once recovered, the encryption key can then be used to eavesdrop on keyboard input, and to insert key strokes. With physical access to a dongle, encryption keys could be recovered with undocumented commands.(CVE-2019-13054, CVE-2019-13055)[2]

External links

References

  1. Bastille—MouseJack Affected Devices. Retrieved 2019-07-09
  2. ZDNet—Logitech wireless USB dongles vulnerable to new hijacking flaws. Dated 2019-07-09. Retrieved 2019-07-09.