Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The Microsoft wireless keyboard uses XOR encryption with a key derived from the MAC address, which makes it easier for remote attackers to obtain keystroke information and inject arbitrary commands via a nearby wireless device, as demonstrated by Keykeriki 2.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Microsoft无线键盘加密问题漏洞
Vulnerability Description
Microsoft无线键盘的加密算法存在漏洞。因其使用XOR加密算法,密钥来自MAC地址,远程攻击者可以通过临近的无线设备,更容易的取得按键信息并注入任意命令,已经通过Keykeriki 2得以论证。
CVSS Information
N/A
Vulnerability Type
N/A