Julia Borgini is a former Lifewire writer and a technical copywriter. She's written for B2B News Network, Kissmetrics, Social Media Examiner, and more.
Updated on February 4, 2022 In This Article In This ArticleThis article explains how to update your Logitech Unifying Receiver software to keep your Logitech wireless mouse, wireless keyboard, or presentation clicker safe and working properly. Information applies to Logitech wireless devices; for other manufacturers, refer to their websites for details.
Updating your Logitech unifying receiver to protect yourself from these attacks is relatively simple. Be sure to update it to the version released on or after August 2019 when Logitech released an additional patch.
Select Continue.
The tool will screen your computer and let you know if any Logitech devices need to be updated.
If the devices are up to date, the tool informs you, and you can select Close to exit the tool.
When a Logitech device has an orange star printed on the side of the receiver, the device is vulnerable to hacks that allow attackers to take control of your computer.
If you receiver doesn't have this star, you're probably safe, but it's still always a best practice to keep all your software and firmware updated to prevent being exposed to potential threats.
The first hack was discovered in 2016 (called "MouseJack"), but the Logitech Unifying Receiver is still at risk. It lets anything sending out a signal pretending to be a wireless mouse to connect to the wireless mouse receiver (dongle) plugged into any computer. The dongle allows the new signal to connect to your computer, no questions asked, and a hacker can gain control of your computer—no matter what security systems you have in place.
This hack works because wireless mouse traffic isn't always encrypted, like most wireless keyboard communication traffic. It affected wireless mice, keyboards, presentation clickers, and other wireless devices from a number of manufacturers, such as Logitech, Microsoft, Amazon, Dell, HP, and Lenovo. However, it's important to note this vulnerability doesn't affect Bluetooth devices or USB wireless dongles that aren't actively in use, just the ones plugged in to your computer.
As security researchers looked into the vulnerability a little further, they discovered additional issues with these dongles. They discovered that attackers could monitor keyboard communication traffic, inject keystrokes through dongles not connected to a wireless keyboard, recover encryption keys, and take over your computer. Now it wasn't just dongles being used, but even ones not plugged into a computer.
The vulnerability was present in all these dongles because of a single wireless chip they use. In Logitech's case, their unifying technology is a standard piece of technology they've been shipping with a wide array of Logitech wireless gear for nearly a decade.
Was this page helpful? Thanks for letting us know!Get the Latest Tech News Delivered Every Day