CVE-2019-18200
📋 TL;DR
This vulnerability affects Fujitsu Wireless Keyboard Set LX390 GK381 devices due to lack of proper encryption in their 2.4 GHz wireless communication. Attackers within radio range can inject keystrokes to execute arbitrary commands on connected systems. Anyone using these specific wireless keyboards is affected.
💻 Affected Systems
- Fujitsu Wireless Keyboard Set LX390 GK381
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise via keystroke injection leading to malware installation, data theft, or complete system takeover on any connected computer.
Likely Case
Local privilege escalation, credential theft, or execution of malicious commands on the victim's system by nearby attackers.
If Mitigated
Limited impact if keyboards are used in physically secure environments with strict access controls and monitoring.
🎯 Exploit Status
Public proof-of-concept tools exist for keystroke injection attacks against these devices.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-011.txt
Restart Required: No
Instructions:
No firmware patch available. Replace affected keyboards with secure alternatives.
🔧 Temporary Workarounds
Use wired keyboard
allReplace vulnerable wireless keyboard with USB wired keyboard
Use Bluetooth keyboard with encryption
allReplace with Bluetooth keyboard that supports proper encryption
🧯 If You Can't Patch
- Physically secure the area to prevent unauthorized radio access
- Monitor for suspicious keyboard activity and implement strict access controls
🔍 How to Verify
Check if Vulnerable:
Check if using Fujitsu Wireless Keyboard Set LX390 GK381 model. No software-based detection available.
Check Version:
N/A - Hardware vulnerability, no version check applicable
Verify Fix Applied:
Verify keyboard has been replaced with non-vulnerable alternative.
📡 Detection & Monitoring
Log Indicators:
- Unexpected keystrokes or commands executed without user input
Network Indicators:
- N/A - This is a wireless peripheral attack, not network-based
SIEM Query:
N/A - Hardware-level attack not detectable via standard SIEM
🔗 References
- http://packetstormsecurity.com/files/154956/Fujitsu-Wireless-Keyboard-Set-LX390-Keystroke-Injection.html
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-011.txt
- https://www.syss.de/pentest-blog/2019/syss-2019-009-syss-2019-010-und-syss-2019-011-schwachstellen-in-weiterer-funktastatur-mit-sicherer-24-ghz-technologie/
- http://packetstormsecurity.com/files/154956/Fujitsu-Wireless-Keyboard-Set-LX390-Keystroke-Injection.html
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-011.txt
- https://www.syss.de/pentest-blog/2019/syss-2019-009-syss-2019-010-und-syss-2019-011-schwachstellen-in-weiterer-funktastatur-mit-sicherer-24-ghz-technologie/