Vulnerabilities
Vulnerable Software
The Microsoft wireless keyboard uses XOR encryption with a key derived from the MAC address, which makes it easier for remote attackers to obtain keystroke information and inject arbitrary commands via a nearby wireless device, as demonstrated by Keykeriki 2.
CVSS Score
7.6
EPSS Score
0.022
Published
2010-03-29


Contact Us

Shodan ® - All rights reserved