CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “logitech”

30 vulnerabilities found for “logitech”

Page 1 of 2

CVE-2024-2537
MEDIUM4.4

Improper Control of Dynamically-Managed Code Resources vulnerability in Logitech Logi Tune on MacOS allows Local Code Inclusion.

logitech / logi_tune
Local
Published Mar 15, 2024
Page 1 of 2
CVE-2022-36263
HIGH7.3

StreamLabs Desktop Application 1.9.0 is vulnerable to Incorrect Access Control via obs64.exe. An attacker can execute arbitrary code via a crafted .exe file.

logitech / streamlabs_desktop
Local
Published Aug 19, 2022
CVE-2022-0916
HIGH8.4

An issue was discovered in Logitech Options. The OAuth 2.0 state parameter was not properly validated. This leaves applications vulnerable to CSRF attacks during authentication and authorization operations.

logitech / options
Network
Published May 3, 2022
CVE-2022-0915
MEDIUM6.0

There is a Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability in Logitech Sync for Windows prior to 2.4.574. Successful exploitation of these vulnerabilities may escalate the permission to the system user.

logitech / sync
Local
Published Apr 12, 2022
CVE-2021-38547
MEDIUM5.9

Logitech Z120 and S120 speakers through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.

logitech / z120_firmware+1
Network
Published Aug 11, 2021
CVE-2021-20641
MEDIUM6.5

Cross-site request forgery (CSRF) vulnerability in LOGITEC LAN-W300N/RS allows remote attackers to hijack the authentication of administrators via a specially crafted URL. As a result, unintended operations to the device such as changes of the device settings may be conducted.

logitech / lan-w300n\/rs_firmware
Network
Published Feb 12, 2021
CVE-2021-20636
MEDIUM6.5

Cross-site request forgery (CSRF) vulnerability in LOGITEC LAN-W300N/PR5B allows remote attackers to hijack the authentication of administrators via a specially crafted URL. As a result, unintended operations to the device such as changes of the device settings may be conducted.

logitech / lan-w300n\/pr5b_firmware
Network
Published Feb 12, 2021
CVE-2021-20642
MEDIUM6.5

Improper check or handling of exceptional conditions in LOGITEC LAN-W300N/RS allows a remote attacker to cause a denial-of-service (DoS) condition by sending a specially crafted URL.

logitech / lan-w300n\/rs_firmware
Network
Published Feb 12, 2021
CVE-2021-20637
MEDIUM6.5

Improper check or handling of exceptional conditions in LOGITEC LAN-W300N/PR5B allows a remote attacker to cause a denial-of-service (DoS) condition by sending a specially crafted URL.

logitech / lan-w300n\/pr5b_firmware
Network
Published Feb 12, 2021
CVE-2016-10761
MEDIUM6.5

Logitech Unifying devices before 2016-02-26 allow keystroke injection, bypassing encryption, aka MouseJack.

logitech / k400r_firmware+5
Adjacent
Published Jun 29, 2019
CVE-2019-13052
MEDIUM6.5

Logitech Unifying devices allow live decryption if the pairing of a keyboard to a receiver is sniffed.

logitech / unifying_receiver_firmware
Adjacent
Published Jun 29, 2019
CVE-2019-13053
MEDIUM6.5

Logitech Unifying devices allow keystroke injection, bypassing encryption. The attacker must press a "magic" key combination while sniffing cryptographic data from a Radio Frequency transmission. NOTE: this issue exists because of an incomplete fix for CVE-2016-10761.

logitech / unifying_receiver_firmware
Adjacent
Published Jun 29, 2019
CVE-2019-13055
MEDIUM6.5

Certain Logitech Unifying devices allow attackers to dump AES keys and addresses, leading to the capability of live decryption of Radio Frequency transmissions, as demonstrated by an attack against a Logitech K360 keyboard.

logitech / unifying_receiver_firmware+1
Adjacent
Published Jun 29, 2019
CVE-2019-12506
HIGH8.8

Due to unencrypted and unauthenticated data communication, the wireless presenter Logitech R700 Laser Presentation Remote R-R0010 is prone to keystroke injection attacks. Thus, an attacker is able to send arbitrary keystrokes to a victim's computer system, e.g., to install malware when the target system is unattended. In this way, an attacker can remotely take control over the victim's computer that is operated with an affected receiver of this device.

logitech / r700_laser_presentation_remote_firmware+1
Adjacent
Published Jun 7, 2019
CVE-2018-15721
CRITICAL9.8

The XMPP server in Logitech Harmony Hub before version 4.15.206 is vulnerable to authentication bypass via a crafted XMPP request. Remote attackers can use this vulnerability to gain access to the local API.

logitech / harmony_hub_firmware
Network
Published Dec 20, 2018
CVE-2018-15723
CRITICAL9.8

The Logitech Harmony Hub before version 4.15.206 is vulnerable to application level command injection via crafted HTTP request. An unauthenticated remote attacker can leverage this vulnerability to execute application defined commands (e.g. harmony.system?systeminfo).

logitech / harmony_hub_firmware
Network
Published Dec 20, 2018
CVE-2018-15720
CRITICAL9.8

Logitech Harmony Hub before version 4.15.206 contained two hard-coded accounts in the XMPP server that gave remote users access to the local API.

logitech / harmony_hub_firmware
Network
Published Dec 20, 2018
CVE-2018-15722
HIGH8.1

The Logitech Harmony Hub before version 4.15.206 is vulnerable to OS command injection via the time update request. A remote server or man in the middle can inject OS commands with a properly formatted response.

logitech / harmony_hub_firmware
Network
Published Dec 20, 2018
CVE-2018-0620
HIGH7.8

Untrusted search path vulnerability in LOGICOOL Game Software versions before 8.87.116 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.

logitech / game_software
Local
Published Jul 26, 2018
CVE-2018-0621
HIGH7.8

Untrusted search path vulnerability in LOGICOOL CONNECTION UTILITY SOFTWARE versions before 2.30.9 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.

logitech / connection_utility_software
Local
Published Jul 26, 2018