Friday, March 1, 2024

Intel Alerts Users to Delete Remote keyboard App After Critical Security Bugs

Intel asks the user’s to uninstall the Intel Remote Keyboard for Android and iOS mobile device after researchers disclosed a critical security bug that allows attackers to inject keystrokes and to escalate privileges.

The Intel Remote Keyboard enables you to easily integrate your smartphone or tablet with a keyboard and mouse, improving your entertainment experience.

Also Read Intel Expands Bug Bounty Program Rewards To $250,000 for Meltdown and Spectre Like Vulnerabilities

CVE-2018-3641 – Privilege escalation bug that allows an attacker to inject keystrokes as a local user
CVE-2018-3645 – Privilege escalation bug that allows a local attacker to inject keystrokes into another remote keyboard session.
CVE-2018-3638 – Privilege escalation bug allows an authorized local attacker to execute arbitrary code as a privileged user.

These bugs affected all the versions of the Intel Remote Keyboard including the last version 1.14 and the severity score of the bug is high. The keyboard app has more than 500,000 installations and it was last updated on June 5, 2017.

Intel Remote Keyboard

Intel says they are to discontinue the support for the remote app and recommends to uninstall the Remote Keyboard uninstall it at their earliest. It has been taken down from the play store.

“Intel has issued a Product Discontinuation notice for Intel Remote Keyboard and recommends that users of the Intel® Remote Keyboard uninstall it at their earliest convenience,” the company said.


Latest articles

Golden Corral restaurant chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...

BEAST AI Jailbreak Language Models Within 1 Minute With High Accuracy

Malicious hackers sometimes jailbreak language models (LMs) to exploit bugs in the systems so...

Hackers Hijack Anycubic 3D Printers to Display Warning Messages

Anycubic 3D printer owners have been caught off guard by a series of unauthorized...

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

Stellar Cyber, the innovator of Open XDR, today announced that RSM US – the leading provider...

Biden Crack Down Sale of Americans’ Personal Data to China & Russia

To safeguard the privacy and security of American citizens, President Joe Biden has issued...

Kali Linux 2024.1 Released – What’s New

Kali Linux recently released version 2024.1, the first release of the year 2024, with...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles