A few years ago, hackers discovered that they could take remote control of a PC by exploiting a vulnerability of Logitech wireless dongles. According to The Verge, the dongles that Logitech ships aujourd & # 39; hui are still vulnerable to the same remote access hack, called "MouseJack", a list that includes the manufacturer Unifying Receiver and the manufacturer's G900 wireless gaming mouse.
While Logitech made deploying patches that fixed the remote access vulnerability for devices that users owned and used in 2016, it is not clear when (or if) these changes were applied to the devices in the factory. Some customers may have purchased unpatched devices and others may stay on store shelves.
A spokesman for Logitech told The Verge:
"Logitech has evaluated the risk for businesses and consumers and has not initiated a recall of products or components already on the market and in the supply chain. We have made the firmware update available to all customers particularly affected and implemented the changes made to the products manufactured later. "
Fortunately, you can fix this vulnerability yourself by updating the firmware of your Logitech device:
- Download the following files for any Logitech Unifying game device (Windows / Mac) or Logitech G900 (Windows) mouse that you own.
- Once downloaded, run each file and follow the on-screen instructions to apply the patches.
This should correct the loopholes, at least for now. Logitech plans to load an additional patch to fix a related vulnerability in August. You must install the appropriate Logitech software for your devices and apply any updates.