Connect with us

Hi, what are you looking for?


Endpoint Security

Wireless Mouse/Keyboard Dongles Expose Computers to Attacks

Researchers at IoT security company Bastille claim to have found a way to hack computers via a vulnerability present in many wireless mouse and keyboard dongles.

Researchers at IoT security company Bastille claim to have found a way to hack computers via a vulnerability present in many wireless mouse and keyboard dongles.

Wireless mice and keyboards communicate with computers over Bluetooth, radio frequency (RF) and infrared via a USB dongle plugged into the device. Over the past years, researchers demonstrated that the lack of strong security mechanisms used by these peripheral devices can be leveraged to log keystrokes and even send arbitrary data to a computer.Mousejack vulnerability

Experts have shown that data can be easily captured by a nearby attacker from many wireless keyboards that use Bluetooth and RF. It has also been demonstrated that Bluetooth keyboard attacks in which an attacker transmits data to the device via the USB dongle are possible.

Now, researchers from Bastille reported uncovering a vulnerability that affects wireless mice and keyboards from several top vendors, including Dell, Logitech, Microsoft, HP, Amazon, Gigabyte, and Lenovo. The security firm says non-Bluetooth wireless devices from other vendors could be affected as well.

An attacker who is within 100 meters (328 feet) of the targeted device can exploit the flaw, which Bastille has dubbed “Mousejack,” to remotely type arbitrary commands into a victim’s computer using just a $15 USB dongle connected to the hacker’s laptop. A malicious actor can use this method to download malware, steal files, and perform other activities they could normally do if they had access to the computer’s keyboard.

Since the vulnerability affects the USB dongles shipped with wireless keyboards and mice, it can be exploited to attack any PC, Mac or Linux computer. The security hole poses a serious risk because the attacker does not need physical access to the targeted machine before carrying out malicious operations.

Keyboards and mice communicate with their dongles by sending RF packets. After researchers demonstrated that keystrokes from wireless keyboards can be intercepted, vendors started encrypting communications. However, the mouse doesn’t use any encryption and the lack of an authentication mechanism allows attackers to mimic such a device and send their own packets to the dongle.

Since some dongles don’t require the use of encryption, an attacker can send specially crafted packets that appear to come from a mouse, but instead of cursor movement and clicks, they generate keypresses.

For a Mousejack attack to work, the attacker must somehow pair their malicious device with the targeted dongle.

Advertisement. Scroll to continue reading.

“To prevent unauthorized devices from pairing with a dongle, it will only accept new devices when it has been placed into a special ‘pairing mode’ by the user, which lasts for 30-60 seconds,” Bastille researchers explained. “It is possible to bypass pairing mode on some dongles and pair a new device without any user interaction.”

In a theoretical attack scenario described by Bastille, the attacker first identifies a target device by listening to RF packets transmitted when the user is typing on the keyboard or moving the mouse. The hacker can then force-pair their fake keyboard with the victim’s dongle and start transmitting key press packets to the targeted computer.

“An attacker is only able to issue commands that would normally be issued by a keyboard. A use case would be installing a rootkit to provide full access to a computer, but this still needs to be accomplished by typing commands as if the attacker were physically in front of the computer,” Bastille researchers said via email.

Bastille told SecurityWeek that affected companies have been notified of the Mousejack vulnerability. However, since a majority of the tested products use one-time programmable chips, vendors cannot push out an update to address the issue.

SecurityWeek has reached out to all the affected vendors named by Bastille and will update this article if they reply.

Microsoft has provided the following statement:

“Microsoft has a customer commitment to investigate reported security issues, and will provide resolution as soon as possible.”

Asif Ahsan, Senior Director of Engineering at Logitech, stated:

“Bastille Security recently approached us regarding our Unifying technology. We have been in regular communication with them since and together have discussed their findings.


Bastille Security identified the vulnerability in a controlled, experimental environment. The vulnerability would be complex to replicate and would require physical proximity to the target. It is therefore a difficult and unlikely path of attack.


Logitech’s Unifying technology was launched in 2007 and has been used by millions of our consumers since. To our knowledge, we have never been contacted by any consumer with such an issue.

We have nonetheless taken Bastille Security’s work seriously and developed a firmware fix. If any of our customers have concerns, and would like to ensure that this potential vulnerability is eliminated, they can download the firmware here. They should also ensure their Logitech Options software is up to date.”

Lenovo has provided the following statement:

“Lenovo has been notified by an independent security researcher who discovered a security vulnerability in older versions of the Lenovo 500 Wireless keyboard. Lenovo has updated this device’s firmware to eliminate the vulnerability. The vulnerability can be accessed when an attacker with specialized equipment comes within close physical proximity — approximately 10 meters, or 33 feet – and enters keyboard inputs into a user’s system. The researcher also identified a similar vulnerability in devices from six other manufacturers.


Customers wanting the updated firmware for their keyboards can exchange their products by contacting the Lenovo Support Center and the exchange will be processed free of charge. Additional technical details are available in an official security advisory on the Lenovo PSIRT (Product Security Incident Response Team) site.” 

Dell provided the following statement:

“Dell has been working with Bastille Research on their latest findings regarding the vulnerabilities identified in Wireless Keyboard Mouse bundle KM632 & KM714.
Customer security is a top concern and priority for Dell and we will work with our customers directly to resolve potential vulnerabilities like this. If you are using the affected models, or question whether you are using an affected model, Dell recommends that you reach out to our Technical support contacts specific to your country as listed here.

Dell Technical Support will assist the customer in addressing the vulnerability, including identifying a suitable Dell replacement if appropriate. In the meantime, customers can largely contain this vulnerability by activating the Operating System’s lock screen when not using the system. Dell would like to thank Bastille Research and those in the security community whose efforts help us protect customers through coordinated vulnerability disclosure.”

Additional details, including a video showing how the attack works, are available on Bastille’s Mousejack website.

*Updated with statement from Microsoft, Logitech, Dell and Lenovo

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.


SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.


People on the Move

Digital executive protection services provider BlackCloak has appointed Ryan Black as CISO.

Joe Levy has been appointed Sophos' permanent CEO, and Jim Dildine has been named the company's CFO.

CISA executive assistant director for cybersecurity Eric Goldstein is leaving the agency after more than three years.

More People On The Move

Expert Insights

Related Content

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Endpoint Security

Gigabyte has announced BIOS updates that remove a recently identified backdoor feature in hundreds of its motherboards.

Endpoint Security

Several major companies have published advisories in response to the Downfall vulnerability affecting Intel CPUs.

Data Protection

By implementing strong security practices,, organizations can significantly reduce the risks associated with lost and stolen computers and safeguard their sensitive information.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Endpoint Security

Apple has launched a new security research blog and website, which will also be the new home of the company’s bug bounty program.

Cloud Security

Intel announced on Tuesday that it has added Intel Trust Domain Extensions (TDX) to its confidential computing portfolio with the launch of its new...