How to Update Your Logitech Unifying Receiver

Julia Borgini is a former Lifewire writer and a technical copywriter. She's written for B2B News Network, Kissmetrics, Social Media Examiner, and more.

Updated on February 4, 2022 In This Article In This Article

What to Know

This article explains how to update your Logitech Unifying Receiver software to keep your Logitech wireless mouse, wireless keyboard, or presentation clicker safe and working properly. Information applies to Logitech wireless devices; for other manufacturers, refer to their websites for details.

How to Update Your Logitech Unifying Receiver

Updating your Logitech unifying receiver to protect yourself from these attacks is relatively simple. Be sure to update it to the version released on or after August 2019 when Logitech released an additional patch.

  1. Navigate to Logitech's update download page in a browser and download the appropriate Windows or Mac update package for your computer.

Logitech Unifying Receiver Update Tool

Select Continue.

Logitech Unifying Receiver Update Tool

The tool will screen your computer and let you know if any Logitech devices need to be updated.

Logitech Unifying Receiver Update Tool

If the devices are up to date, the tool informs you, and you can select Close to exit the tool.

Identifying If Your Logitech Dongle Is Vulnerable

When a Logitech device has an orange star printed on the side of the receiver, the device is vulnerable to hacks that allow attackers to take control of your computer.

Logitech Unified Receiver - Early Model

If you receiver doesn't have this star, you're probably safe, but it's still always a best practice to keep all your software and firmware updated to prevent being exposed to potential threats.

How the Logitech Unifying Receiver Hack Works

The first hack was discovered in 2016 (called "MouseJack"), but the Logitech Unifying Receiver is still at risk. It lets anything sending out a signal pretending to be a wireless mouse to connect to the wireless mouse receiver (dongle) plugged into any computer. The dongle allows the new signal to connect to your computer, no questions asked, and a hacker can gain control of your computer—no matter what security systems you have in place.

This hack works because wireless mouse traffic isn't always encrypted, like most wireless keyboard communication traffic. It affected wireless mice, keyboards, presentation clickers, and other wireless devices from a number of manufacturers, such as Logitech, Microsoft, Amazon, Dell, HP, and Lenovo. However, it's important to note this vulnerability doesn't affect Bluetooth devices or USB wireless dongles that aren't actively in use, just the ones plugged in to your computer.

More Risk for Wireless Devices

As security researchers looked into the vulnerability a little further, they discovered additional issues with these dongles. They discovered that attackers could monitor keyboard communication traffic, inject keystrokes through dongles not connected to a wireless keyboard, recover encryption keys, and take over your computer. Now it wasn't just dongles being used, but even ones not plugged into a computer.

The vulnerability was present in all these dongles because of a single wireless chip they use. In Logitech's case, their unifying technology is a standard piece of technology they've been shipping with a wide array of Logitech wireless gear for nearly a decade.

Was this page helpful? Thanks for letting us know!

Get the Latest Tech News Delivered Every Day