CVE-2016-6257
Description
The firmware in Lenovo Ultraslim dongles, as used with Lenovo Liteon SK-8861, Ultraslim Wireless, and Silver Silk keyboards and Liteon ZTM600 and Ultraslim Wireless mice, does not enforce incrementing AES counters, which allows remote attackers to inject encrypted keyboard input into the system by leveraging proximity to the dongle, aka a "KeyJack injection attack."
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Lenovo Ultraslim dongle firmware fails to increment AES counters, allowing nearby attackers to inject arbitrary keystrokes via replayed encrypted packets.
Vulnerability
The vulnerability resides in the firmware of the Lenovo Ultraslim USB dongle (USB ID 17ef:6032), which does not enforce incrementing of AES counters for each transmitted packet [1][2]. This allows the same keystream to be reused across packets. The affected devices include Lenovo Ultraslim Wireless, Lenovo Liteon SK-8861, and Silver Silk keyboards, as well as Liteon ZTM600 and Ultraslim Wireless mice that use this dongle [1].
Exploitation
An attacker must be within wireless range of the dongle to sniff a single legitimate encrypted packet from the keyboard. Because the AES counter is static, the captured keystream can be combined with a known plaintext to recover the keystream, or the packet can be directly replayed with a different keystroke value [1]. The attacker then transmits the forged packet to the dongle, which accepts it as valid, injecting the keystroke into the host system [2].
Impact
Successful exploitation enables an attacker to inject arbitrary keystrokes into the victim's system without knowledge of the encryption key. This can be leveraged to execute commands, install malware, or exfiltrate data, effectively gaining full control at the user's privilege level [1][2].
Mitigation
Lenovo has released a firmware update that enforces proper AES counter incrementing for the affected dongle [1]. Users should immediately update the dongle firmware through Lenovo's support resources. As a temporary workaround, disconnecting the wireless dongle and using a wired keyboard and mouse eliminates the attack surface [1].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.securityfocus.com/bid/92179nvdThird Party AdvisoryVDB Entry
- github.com/BastilleResearch/keyjack/blob/master/doc/advisories/bastille-13.lenovo-ultraslim.public.txtnvdThird Party Advisory
- support.lenovo.com/product_security/len_7267nvdVendor Advisory
- www.bastille.net/research/vulnerabilities/keyjacknvdThird Party Advisory
News mentions
0No linked articles in our index yet.