ID

VAR-201910-0871


CVE

CVE-2019-18201


TITLE

Fujitsu Wireless Keyboard Set LX390 Vulnerability related to lack of encryption of critical data on devices

Trust: 0.8

sources: JVNDB: JVNDB-2019-011448

DESCRIPTION

An issue was discovered on Fujitsu Wireless Keyboard Set LX390 GK381 devices. Because of the lack of proper encryption of 2.4 GHz communication, an attacker is able to eavesdrop on sensitive data such as passwords. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Advisory ID: SYSS-2019-010 Product: Wireless Keyboard Set LX390 Manufacturer: Fujitsu Affected Version(s): Model No. GK381 Tested Version(s): Model No. GK381 Vulnerability Type: Missing Encryption of Sensitive Data (CWE-311) Risk Level: High Solution Status: Open (product reached end-of-life (EOL) in May 2019) Manufacturer Notification: 2019-04-01 Solution Date: - Public Disclosure: 2019-10-23 CVE Reference: CVE-2019-18201 Author of Advisory: Matthias Deeg (SySS GmbH) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Overview: Fujitsu Wireless Keyboard Set LX390 is a wireless desktop set consisting of a mouse and a keyboard. The manufacturer describes the product as follows (see [1, 2]): "The Wireless Keyboard Set LX390 is an excellent desktop solution for users with ambition. This durable keyboard set is equipped with secure 2.4 GHz technology and plug and play technology. The elegant mouse works on most surfaces due to its precise 1000 dpi sensor. However, the payload and checksum of data packets are transmitted in an encoded way using so-called data whitening or data scrambling of the used 2.4 GHz radio transceiver. Thus, without knowing this data whitening mechanism and its configuration, an attacker cannot actually gain access to the cleartext payload contents of transmitted radio packets during a sniffing attack. By analyzing the Fujitsu LX390 keyboard and its radio communication, SySS was able to identify the used communication protocol, the data whitening mechanism, and how to find the correct data whitening configuration by sniffing the radio communication of a specific keyboard. With this knowledge, an attacker can remotely analyze and decode sent keyboard events of a Fujitsu LX390 keyboard as cleartext, for instance keystrokes, and thus gain unauthorized access to sensitive data like passwords. Knowing how to analyze the data communication of a Fujitsu LX390 keyboard also enabled SySS to synthesize valid data packets which allowed for key stroke injection attacks, which are described in the SySS security advisory SYSS-2019-011 (see [3]). ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Proof of Concept (PoC): SySS GmbH could successfully perform sniffing attacks against the 2.4 GHz radio communication of the Fujitsu LX390 keyboard using a software-defined radio and an in-house developed software tool utilizing GNU Radio [3]. For the protocol analysis,the software tool Universal Radio Hacker [4] was used. SySS GmbH could also perform successful sniffing attacks using another in-house developed software tool in combination with the USB radio dongle Crazyradio PA and the nrf-research-firmware by Bastille Networks Internet Security written by Marc Newlin (see [6] and [7]). The following output of the developed PoC software tool illustrates a successful keystroke sniffing attack. # python3 fujitsu_lx390_sniffer.py -l -p "3b:5b:53:bd:43" -c 28 _ __ _ _ ____ _ __ __ | |/ /___ _ _ ___| |_ _ __ ___ | | _____ / ___| _ __ (_)/ _|/ _| ___ _ __ | ' // _ \ | | / __| __| '__/ _ \| |/ / _ \ \___ \| '_ \| | |_| |_ / _ \ '__| | . \ __/ |_| \__ \ |_| | | (_) | < __/ ___) | | | | | _| _| __/ | |_|\_\___|\__, |___/\__|_| \___/|_|\_\___| |____/|_| |_|_|_| |_| \___|_| |___/ SySS Fujitsu LX390 Keystroke Sniffer - PoC Tool v0.1 by Matthias Deeg - SySS GmbH Based on different tools by Marc Newlin - --- 3B:5B:53:BD:43:DB 42:EF:F5:0A:2D 02:45:13:93:AB KEY_P 3B:5B:53:BD:43:DB 42:CF:F5:0C:CB 02:41:13:F3:CC KEY_P 3B:5B:53:BD:43:DB 42:EF:F5:0A:2D 02:45:13:93:AB KEY_P 3B:5B:53:BD:43:DB 42:CF:1D:70:ED 02:41:04:CD:A8 KEY_A 3B:5B:53:BD:43:DB 42:EF:1D:76:0B 02:45:04:AD:CF KEY_A 3B:5B:53:BD:43:DB 42:CF:1D:70:ED 02:41:04:CD:A8 KEY_A 3B:5B:53:BD:43:DB 42:EF:55:BF:C7 02:45:16:3E:FC KEY_S 3B:5B:53:BD:43:DB 42:CF:55:B9:21 02:41:16:5E:9B KEY_S 3B:5B:53:BD:43:DB 42:EF:55:BF:C7 02:45:16:3E:FC KEY_S 3B:5B:53:BD:43:DB 42:EF:65:89:94 02:45:1A:52:36 KEY_W (...) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution: The Fujitsu Wireless Keyboard Set LX390 reached its end-of-life (EOL) in May 2019. SySS recommends replacing LX390 wireless keyboard sets used in environments with higher security demands, for instance with one of the newer successor models LX410 or LX960. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Disclosure Timeline: 2019-04-01: Vulnerability reported to manufacturer 2019-04-02: Fujitsu confirms receipt of security advisory and asks questions regarding the reported security issue; answered open questions 2019-04-11: Received further questions from manufacturer 2019-04-18: Answered open questions and postponed disclosure date 2019-10-08: Reminded manufacturer of the upcoming release of the security advisory 2019-10-18: Discussed details of coordinated disclosure with manufacturer 2019-10-21: Public release of security advisory ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ References: [1] Product website for Fujitsu Wireless Keyboard Set LX390 https://www.fujitsu.com/global/products/computing/peripheral/accessories/input-devices/keyboards/keyboard-lx390.html [2] Data sheet Fujitsu Wireless Keyboard Set LX390 https://produktinfo.conrad.com/datenblaetter/1300000-1399999/001375431-da-01-en-FUJITSU_DESKTOP_SET_WIREL_LX390_WEISS.pdf [3] SySS Security Advisory SYSS-2019-011 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-011.txt [4] GNU Radio https://www.gnuradio.org/ [5] Universal Radio Hacker (URH) https://github.com/jopohl/urh [6] Product website for Crazyradio PA https://www.bitcraze.io/crazyradio-pa/ [7] Bastille's nRF24 research firmware and tools https://github.com/BastilleResearch/nrf-research-firmware [8] Product website for Fujitsu Wireless Keyboard Set LX410 https://www.fujitsu.com/global/products/computing/peripheral/accessories/input-devices/keyboards/keyboard-lx410.html [9] Product website for Fujitsu Wireless Keyboard Set LX960 https://www.fujitsu.com/global/products/computing/peripheral/accessories/input-devices/keyboards/keyboard-lx960.html [10] SySS Security Advisory SYSS-2019-010 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-010.txt [11] SySS Responsible Disclosure Policy https://www.syss.de/en/responsible-disclosure-policy/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Credits: This security vulnerability was found by Matthias Deeg of SySS GmbH. E-Mail: matthias.deeg (at) syss.de Public Key: https://www.syss.de/fileadmin/dokumente/PGPKeys/Matthias_Deeg.asc Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Disclaimer: The information provided in this security advisory is provided "as is" and without warranty of any kind. Details of this security advisory may be updated in order to provide as accurate information as possible. The latest version of this security advisory is available on the SySS Web site. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Copyright: Creative Commons - Attribution (by) - Version 3.0 URL: http://creativecommons.org/licenses/by/3.0/deed.en -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE0fCgNfBs5nXNuQUU2aS/ajStTasFAl2wG84ACgkQ2aS/ajSt TasGfA/6A2+us49Z3ZAYp/ctq+bCORNooowoZFf0eYW5+k0pLOuVusTA+sGwnxgN VZcCpAzGKkkXiqOI+vVgzyncjzFY33GAiFEat+pFjsxRL9clO0rKKWTymTKA5uIR 1nn4cR98gfgB5ik5u6WZSQeH6hmP/kEmjRMjS0B7LjrFu+oWU3rnIqS4RhcSYRdd 9JSEdj2wD9R3IHwglZE7t8d/p4OBXmq+Ith0fzssJW2J+salsqwuD8YK58fMe1J5 i8WutJry1LCW+eYrC9MQYWSYVlj82manqoyP8GLJtRkt9Wk1Zp+kNr4bn7t8GP0J N/QTLzUOrOfL9tsbsPxOU6t5rCS40iZdD3d2UFDQPgJHreUA6ocJN3f4ajnzwq7h Xj/Q+t43zhfi6IqbqBciDBzFskO/AVyo7odP7RRt5g4p8fE40+PogNegaO+n1vBv K2gTPGk3pgogkxT+Dk8fpPalVltr7eSRz+0/3KLun9JUgQMJc1SB2pjNDlV6nAFC vg7QJ6aWufrNKia4/NorKXrD48ubBkvA6R+CVDed1ePbbQSDpFzjgVRHoc+5vXsE BCU/QlEK6LmM2OylFvsmlEaHA/UDmXb2ppCrxTbgAywcKlJ3JogbgKaKrKfLXTn0 lpFMUy3CyDUJmP2mT5uzsGqp+nj97TBWgdPcaccd7xEeWxU9xW4= =Noe8 -----END PGP SIGNATURE-----

Trust: 2.25

sources: NVD: CVE-2019-18201 // JVNDB: JVNDB-2019-011448 // CNVD: CNVD-2019-38489 // PACKETSTORM: 154955

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-38489

AFFECTED PRODUCTS

vendor:fujitsumodel:lx390scope:eqversion: -

Trust: 1.6

vendor:fujitsumodel:wireless keyboard set lx390scope:eqversion:gk381

Trust: 0.8

vendor:fujitsumodel:wireless keyboard set lx390 gk381scope: - version: -

Trust: 0.6

vendor:fujitsumodel:lx390scope:eqversion:gk381

Trust: 0.6

sources: CNVD: CNVD-2019-38489 // JVNDB: JVNDB-2019-011448 // CNNVD: CNNVD-201910-1438 // NVD: CVE-2019-18201

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-18201
value: HIGH

Trust: 1.0

NVD: CVE-2019-18201
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-38489
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201910-1438
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2019-18201
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-38489
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-18201
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2019-18201
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-38489 // JVNDB: JVNDB-2019-011448 // CNNVD: CNNVD-201910-1438 // NVD: CVE-2019-18201

PROBLEMTYPE DATA

problemtype:CWE-319

Trust: 1.0

problemtype:CWE-311

Trust: 0.8

sources: JVNDB: JVNDB-2019-011448 // NVD: CVE-2019-18201

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201910-1438

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201910-1438

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-011448

PATCH

title:Top Pageurl:https://www.fujitsu.com/

Trust: 0.8

sources: JVNDB: JVNDB-2019-011448

EXTERNAL IDS

db:NVDid:CVE-2019-18201

Trust: 3.1

db:PACKETSTORMid:154955

Trust: 2.3

db:JVNDBid:JVNDB-2019-011448

Trust: 0.8

db:CNVDid:CNVD-2019-38489

Trust: 0.6

db:CNNVDid:CNNVD-201910-1438

Trust: 0.6

sources: CNVD: CNVD-2019-38489 // JVNDB: JVNDB-2019-011448 // PACKETSTORM: 154955 // CNNVD: CNNVD-201910-1438 // NVD: CVE-2019-18201

REFERENCES

url:https://www.syss.de/pentest-blog/2019/syss-2019-009-syss-2019-010-und-syss-2019-011-schwachstellen-in-weiterer-funktastatur-mit-sicherer-24-ghz-technologie/

Trust: 2.4

url:http://packetstormsecurity.com/files/154955/fujitsu-wireless-keyboard-set-lx390-missing-encryption.html

Trust: 2.2

url:https://www.syss.de/fileadmin/dokumente/publikationen/advisories/syss-2019-010.txt

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-18201

Trust: 1.5

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18201

Trust: 0.8

url:http://creativecommons.org/licenses/by/3.0/deed.en

Trust: 0.1

url:https://www.syss.de/fileadmin/dokumente/pgpkeys/matthias_deeg.asc

Trust: 0.1

url:https://www.syss.de/fileadmin/dokumente/publikationen/advisories/syss-2019-011.txt

Trust: 0.1

url:https://www.gnuradio.org/

Trust: 0.1

url:https://produktinfo.conrad.com/datenblaetter/1300000-1399999/001375431-da-01-en-fujitsu_desktop_set_wirel_lx390_weiss.pdf

Trust: 0.1

url:https://www.syss.de/en/responsible-disclosure-policy/

Trust: 0.1

url:https://www.fujitsu.com/global/products/computing/peripheral/accessories/input-devices/keyboards/keyboard-lx960.html

Trust: 0.1

url:https://www.fujitsu.com/global/products/computing/peripheral/accessories/input-devices/keyboards/keyboard-lx390.html

Trust: 0.1

url:https://www.bitcraze.io/crazyradio-pa/

Trust: 0.1

url:https://www.fujitsu.com/global/products/computing/peripheral/accessories/input-devices/keyboards/keyboard-lx410.html

Trust: 0.1

url:https://github.com/jopohl/urh

Trust: 0.1

url:https://github.com/bastilleresearch/nrf-research-firmware

Trust: 0.1

sources: CNVD: CNVD-2019-38489 // JVNDB: JVNDB-2019-011448 // PACKETSTORM: 154955 // CNNVD: CNNVD-201910-1438 // NVD: CVE-2019-18201

CREDITS

Matthias Deeg

Trust: 0.7

sources: PACKETSTORM: 154955 // CNNVD: CNNVD-201910-1438

SOURCES

db:CNVDid:CNVD-2019-38489
db:JVNDBid:JVNDB-2019-011448
db:PACKETSTORMid:154955
db:CNNVDid:CNNVD-201910-1438
db:NVDid:CVE-2019-18201

LAST UPDATE DATE

2024-11-23T23:04:36.819000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-38489date:2019-11-01T00:00:00
db:JVNDBid:JVNDB-2019-011448date:2019-11-07T00:00:00
db:CNNVDid:CNNVD-201910-1438date:2019-11-04T00:00:00
db:NVDid:CVE-2019-18201date:2024-11-21T04:32:49.177

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-38489date:2019-11-01T00:00:00
db:JVNDBid:JVNDB-2019-011448date:2019-11-07T00:00:00
db:PACKETSTORMid:154955date:2019-10-23T20:04:03
db:CNNVDid:CNNVD-201910-1438date:2019-10-23T00:00:00
db:NVDid:CVE-2019-18201date:2019-10-24T15:15:32.370