Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.112467
Category:General
Title:Logitech Options < 7.10.3 Remote Command Execution Vulnerability (Windows)
Summary:Logitech Options is prone to a remote command execution;vulnerability.
Description:Summary:
Logitech Options is prone to a remote command execution
vulnerability.

Vulnerability Insight:
Upon installation of Logitech Options a WebSocket server is
being opened that any website can connect to, without any origin checking at all.

The only way of 'authentication' is by providing a pid (process ID) of a process owned by the
current user.
However, since there is no limitation of guesses, an attacker might be able to bypass this
authentication in microseconds.

Vulnerability Impact:
Successful exploitation would allow an attacker to send commands
and options, configure the 'crown' to send arbitrary keystrokes to directly affect and manipulate
the target system and have other unspecified impact on it.

Affected Software/OS:
Logitech Options through version 7.0.564.

Solution:
Update to Logitech Options version 7.10.3 or later.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

CopyrightCopyright (C) 2018 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.