Medium
CVSS 4.6
Overview
Logitech iTouch keyboards allows attackers with physical access to the system to bypass the screen locking function and execute user-defined commands that have been assigned to a button.
Logitech iTouch keyboards allows attackers with physical access to the system to...
Logitech iTouch keyboards allows attackers with physical access to the system to bypass the screen locking function and execute user-defined commands that have been assigned to a button.
This vulnerability is rated 🟡 MEDIUM.
Recommended actions: