Logitech » Cordless Itouch Keyboard : Security Vulnerabilities, CVEs,
Logitech iTouch keyboards allows attackers with physical access to the system to bypass the screen locking function and execute user-defined commands that have been assigned to a button.
Max CVSS
4.6
EPSS Score
0.17%
Published
2002-12-31
Updated
2017-07-11
A long 'synch' delay in Logitech wireless mice and keyboard receivers allows a remote attacker to hijack connections via a man-in-the-middle attack.
Max CVSS
7.5
EPSS Score
0.60%
Published
2001-10-18
Updated
2017-12-19
2 vulnerabilities found