Microsoft Security Advisory 3152550

Update to Improve Wireless Mouse Input Filtering

Published: April 12, 2016 | Updated: April 22, 2016

Version: 1.1

Executive Summary

Microsoft is announcing the availability of an update to improve input filtering for certain Microsoft wireless mouse devices. The update enhances security by filtering out QWERTY key packets in keystroke communications issued from receiving USB wireless dongles to wireless mouse devices. This improvement is part of ongoing efforts to improve the effectiveness of security in Windows and Microsoft devices. For more information, see Microsoft Knowledge Base Article 3152550.

A vulnerability has been discovered that allows keyboard HID packets to be injected into Microsoft wireless mouse devices through USB dongles. USB dongles will accept keyboard HID packets transmitted to the RF addresses of wireless mouse devices.

Recommendation

Microsoft recommends installing a filter driver available as an optional update for customers who use wireless mouse devices affected by this vulnerability. For the list of affected devices, see the Affected Devices section. For more information about affected operating systems, see the Affected Software section.

Microsoft recommends that customers test any new settings prior to implementation in their environments. Please see the Suggested Actions section of this advisory for more information.

Advisory Details

Issue References

For more information about this issue, see the following references:

References Identification
Microsoft Knowledge Base Article 3152550  

Affected Software

This update in this advisory applies to the following operating systems:

Windows 7
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1
Windows 8.1 for 32-bit Systems
Windows 8.1 for x64-based Systems
Windows 10
Windows 10 for 32-bit Systems[1]
Windows 10 for x64-based Systems[1]
Windows 10 Version 1511 for 32-bit Systems[1]
Windows 10 Version 1511 for x64-based Systems[1]

[1] Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the Microsoft Update Catalog

Affected Devices

For this advisory, the following Microsoft wireless devices are affected:

Sculpt Ergonomic mouse
Sculpt Mobile Mouse
Wireless Mobile Mouse 3000 v2.0
Wireless Mobile Mouse 3500
Wireless Mobile Mouse 4000
Wireless Mouse 1000
Wireless Mouse 2000
Wireless Mouse 5000
Arc Touch Mouse

Advisory FAQ

What is the scope of the advisory?
The purpose of this advisory is to notify customers that an update is available to improve input filtering for affected Microsoft wireless mouse devices. The update enhances security by filtering out QWERTY key frames in communications issued from receiving USB wireless dongles to affected wireless mouse devices.

What causes the issue? 
A vulnerability has been discovered that allows keyboard HID packets to be injected into Microsoft wireless mouse devices through USB dongles. USB dongles will accept keyboard HID packets transmitted to the RF addresses of affected wireless mouse devices.

What might an attacker use the vulnerability to do? 
An attacker could use the vulnerability to inject arbitrary keyboard HID packets (for example, to simulate keystrokes) into a USB dongle.

How could an attacker exploit the vulnerability? 
To exploit the vulnerability, an attacker could inject malicious commands into a victim’s computer through an attached USB dongle. The attack would require physical proximity to be in wireless range of the target computer. Note, however, that an attacker would not be able to sniff or recover plain text information, such as passwords, from encrypted sessions.

What does the update do? 
The update enhances security by filtering out QWERTY key packets in communications issued from receiving USB wireless dongles to affected Microsoft wireless mouse devices. The update prevents dongles that are included with a standalone mouse from receiving keyboard-type signals.

I am using one of the devices listed in the Affected Devices table on an affected operating system. Why am I not receiving this update?
This security update supports only standalone mouse devices. Mouse devices sold as a keyboard and mouse Desktop package are not supported.

How can I determine if my mouse was originally part of a Desktop package?
For more information, see the steps in “How to determine if your mouse is standalone or part of a Desktop package” in the Other Information section.

Why does this update not service my keyboard and mouse Desktop package?
Applying this change to a dongle that is used for a keyboard and mouse Desktop package would prevent the normal reception of keystroke signals from the keyboard.

Suggested Actions

  • Apply the update for supported releases of Microsoft Windows

    The optional update is available through Windows Update. If automatic updating is enabled, customers can install the update automatically. For more information about how to turn on automatic updating, please see Windows Update. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871.

    In some circumstances, customers who have enabled automatic updating may need to install this update manually, and can obtain the update from Microsoft Update Catalog. For more information on how to manually apply the update, see Microsoft Knowledge Base Article 3152550.

Additional Suggested Actions

  • Protect your PC
    We continue to encourage customers to follow our Protect Your Computer guidance of enabling a firewall, getting software updates and installing antivirus software. For more information, see Microsoft Safety & Security Center.

  • Keep Microsoft Software Updated
    Users running Microsoft software should apply the latest Microsoft security updates to help make sure that their computers are as protected as possible. If you are not sure whether your software is up to date, visit Microsoft Update, scan your computer for available updates, and install any high-priority updates that are offered to you. If you have automatic updating enabled and configured to provide updates for Microsoft products, the updates are delivered to you when they are released, but you should verify that they are installed. 

Other Information

How to determine if a mouse is standalone or part of a Desktop package

  1. Download and install Microsoft Mouse and Keyboard Center.
  2. Connect an affected Microsoft wireless mouse, and disconnect other Microsoft keyboards and mouse devices.
  3. Launch the Microsoft Mouse and Keyboard Center from the Windows Start menu.
  4. In the main window of the Microsoft Mouse and Keyboard Center:
    1. If only one mouse is detected and displayed, then the mouse is a standalone mouse.
    2. If one keyboard and one mouse are detected and displayed, the mouse is part of a Desktop package.
  5. You can uninstall Microsoft Mouse and Keyboard Center from Programs and Features if you no longer need it.

Microsoft Active Protections Program (MAPP)

To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections websites provided by program partners, listed in Microsoft Active Protections Program (MAPP) Partners.

Feedback

Support

Disclaimer

The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

Revisions

  • V1.0 (April 12, 2016): Advisory published.
  • V1.1 (April 22, 2016): Added FAQs and additional information to clarify that only standalone mouse devices are affected. This is an informational change only.

Page generated 2016-04-22 12:41-07:00.