Описание
Logitech iTouch keyboards allows attackers with physical access to the system to bypass the screen locking function and execute user-defined commands that have been assigned to a button.
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:h:logitech:cordless_freedom_itouch_keyboard:*:*:*:*:*:*:*:*
cpe:2.3:h:logitech:cordless_itouch_keyboard:*:*:*:*:*:*:*:*
cpe:2.3:h:logitech:itouch_keyboard:*:*:*:*:*:*:*:*
EPSS
Процентиль: 22%
0.00071
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Logitech iTouch keyboards allows attackers with physical access to the system to bypass the screen locking function and execute user-defined commands that have been assigned to a button.
EPSS
Процентиль: 22%
0.00071
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other