VAR-201608-0041

Vulnerability from variot - Updated: 2025-04-13 23:38

The firmware in Lenovo Ultraslim dongles, as used with Lenovo Liteon SK-8861, Ultraslim Wireless, and Silver Silk keyboards and Liteon ZTM600 and Ultraslim Wireless mice, does not enforce incrementing AES counters, which allows remote attackers to inject encrypted keyboard input into the system by leveraging proximity to the dongle, aka a "KeyJack injection attack.". This vulnerability "KeyJack Injection attack " It is called.By using a dongle operation, a third party could insert encrypted keyboard input into the system. LenovoWirelessMouseBlack and others are products of Lenovo's wireless desktop package with mouse and keyboard. Remote security vulnerabilities exist in several Lenovo products, which can be exploited by an attacker using LenovoUltraslim Wireless's electronic dog to inject keyboard input. Multiple Lenovo Products are prone to a remote security vulnerability. Lenovo Liteon SK-8861, etc. are all products of China Lenovo. Lenovo Ultraslim dongles are a dongle

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201608-0041",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "usb dongle",
        "scope": null,
        "trust": 1.6,
        "vendor": "amazonbasics",
        "version": null
      },
      {
        "model": "ultraslim dongle",
        "scope": null,
        "trust": 1.6,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": "unifying dongle",
        "scope": null,
        "trust": 1.6,
        "vendor": "logitech",
        "version": null
      },
      {
        "model": "km632 usb dongle",
        "scope": null,
        "trust": 1.6,
        "vendor": "dell",
        "version": null
      },
      {
        "model": "km714 usb dongle",
        "scope": null,
        "trust": 1.6,
        "vendor": "dell",
        "version": null
      },
      {
        "model": "ultraslim",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": "unifying",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "logitech",
        "version": "012.005.00028"
      },
      {
        "model": "km714",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dell",
        "version": "012.005.00028"
      },
      {
        "model": "unifying",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "logitech",
        "version": "024.003.00027"
      },
      {
        "model": "km632",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dell",
        "version": null
      },
      {
        "model": "",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "amazonbasics",
        "version": null
      },
      {
        "model": "wireless keyboard",
        "scope": null,
        "trust": 0.8,
        "vendor": "amazonbasics",
        "version": null
      },
      {
        "model": "ultraslim wireless keyboard",
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": "km632 wireless mouse",
        "scope": null,
        "trust": 0.8,
        "vendor": "dell",
        "version": null
      },
      {
        "model": "km714 wireless keyboard \u0026 mouse",
        "scope": null,
        "trust": 0.8,
        "vendor": "dell",
        "version": null
      },
      {
        "model": "wireless mouse black",
        "scope": null,
        "trust": 0.6,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": "wireless mouse black",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "lenovo",
        "version": "0"
      },
      {
        "model": "wireless keyboard black",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "lenovo",
        "version": "0"
      },
      {
        "model": "silver silk 2.4g kb -black",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "lenovo",
        "version": "0"
      },
      {
        "model": "liteon ztm600 2.4g mouse",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "lenovo",
        "version": "0"
      },
      {
        "model": "liteon sk-8861 2.4g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "lenovo",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05943"
      },
      {
        "db": "BID",
        "id": "92179"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004163"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1048"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6257"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:amazonbasics:usb_dongle",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:amazonbasics:usb_dongle_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:amazonbasics:wireless_keyboard",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lenovo:ultraslim_dongle",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:lenovo:ultraslim_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lenovo:ultraslim_wireless_keyboard",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:logitech:unifying_dongle",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:logitech:unifying_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:dell:km632_dongle",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dell:km632_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:dell:km632_wireless_keyboard",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:dell:km714_dongle",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:dell:km714_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:dell:km714_wireless_keyboard",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004163"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Marc Newlin from Bastille Threat Research Team.",
    "sources": [
      {
        "db": "BID",
        "id": "92179"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1048"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2016-6257",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.5,
            "id": "CVE-2016-6257",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 1.8,
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2016-05943",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.5,
            "id": "VHN-95077",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:A/AC:L/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.8,
            "id": "CVE-2016-6257",
            "impactScore": 3.6,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Adjacent Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 6.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2016-6257",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-6257",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-6257",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-05943",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201607-1048",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-95077",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05943"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95077"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004163"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1048"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6257"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The firmware in Lenovo Ultraslim dongles, as used with Lenovo Liteon SK-8861, Ultraslim Wireless, and Silver Silk keyboards and Liteon ZTM600 and Ultraslim Wireless mice, does not enforce incrementing AES counters, which allows remote attackers to inject encrypted keyboard input into the system by leveraging proximity to the dongle, aka a \"KeyJack injection attack.\". This vulnerability \"KeyJack Injection attack \" It is called.By using a dongle operation, a third party could insert encrypted keyboard input into the system. LenovoWirelessMouseBlack and others are products of Lenovo\u0027s wireless desktop package with mouse and keyboard. Remote security vulnerabilities exist in several Lenovo products, which can be exploited by an attacker using LenovoUltraslim Wireless\u0027s electronic dog to inject keyboard input. Multiple Lenovo Products are prone to a remote security vulnerability. Lenovo Liteon SK-8861, etc. are all products of China Lenovo. Lenovo Ultraslim dongles are a dongle",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-6257"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004163"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05943"
      },
      {
        "db": "BID",
        "id": "92179"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95077"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-6257",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "92179",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004163",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1048",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05943",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-95077",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05943"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95077"
      },
      {
        "db": "BID",
        "id": "92179"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004163"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1048"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6257"
      }
    ]
  },
  "id": "VAR-201608-0041",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05943"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95077"
      }
    ],
    "trust": 1.45
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05943"
      }
    ]
  },
  "last_update_date": "2025-04-13T23:38:59.361000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "LEN-7267",
        "trust": 0.8,
        "url": "https://support.lenovo.com/jp/ja/product_security/len_7267"
      },
      {
        "title": "Logitech Response to Unifying Receiver/G900 Mouse Research Findings",
        "trust": 0.8,
        "url": "https://community.logitech.com/s/question/0D531000058b3B7CAI"
      },
      {
        "title": "Patches for multiple Lenovo product remote vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/80049"
      },
      {
        "title": "Lenovo Ultraslim Repair measures for protector security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63358"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05943"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004163"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1048"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-310",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95077"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004163"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6257"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "https://github.com/bastilleresearch/keyjack/blob/master/doc/advisories/bastille-13.lenovo-ultraslim.public.txt"
      },
      {
        "trust": 2.5,
        "url": "https://www.bastille.net/research/vulnerabilities/keyjack"
      },
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/92179"
      },
      {
        "trust": 1.7,
        "url": "https://support.lenovo.com/product_security/len_7267"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6257"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6257"
      },
      {
        "trust": 0.8,
        "url": "https://github.com/bastilleresearch/keyjack/blob/master/doc/advisories/bastille-13.amazon-basics.public.txt"
      },
      {
        "trust": 0.8,
        "url": "https://github.com/bastilleresearch/keyjack/blob/master/doc/advisories/bastille-13.dell-km632.public.txt"
      },
      {
        "trust": 0.8,
        "url": "https://github.com/bastilleresearch/keyjack/blob/master/doc/advisories/bastille-13.dell-km714.public.txt"
      },
      {
        "trust": 0.8,
        "url": "https://github.com/bastilleresearch/keyjack/blob/master/doc/advisories/bastille-13.logitech.public.txt"
      },
      {
        "trust": 0.3,
        "url": "http://www.lenovo.com/ca/en/"
      },
      {
        "trust": 0.3,
        "url": "https://support.lenovo.com/us/en/product_security/len_7267"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05943"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95077"
      },
      {
        "db": "BID",
        "id": "92179"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004163"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1048"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6257"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05943"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95077"
      },
      {
        "db": "BID",
        "id": "92179"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004163"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1048"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6257"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-08-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-05943"
      },
      {
        "date": "2016-08-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-95077"
      },
      {
        "date": "2016-07-28T00:00:00",
        "db": "BID",
        "id": "92179"
      },
      {
        "date": "2016-08-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-004163"
      },
      {
        "date": "2016-07-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201607-1048"
      },
      {
        "date": "2016-08-02T14:59:04.490000",
        "db": "NVD",
        "id": "CVE-2016-6257"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-08-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-05943"
      },
      {
        "date": "2016-08-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-95077"
      },
      {
        "date": "2016-07-28T00:00:00",
        "db": "BID",
        "id": "92179"
      },
      {
        "date": "2016-08-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-004163"
      },
      {
        "date": "2021-04-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201607-1048"
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2016-6257"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1048"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Lenovo Used in products  Lenovo Ultraslim Dongle firmware vulnerabilities that allow encrypted keyboard input to be inserted into the system",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004163"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1048"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…