{"id":1795,"date":"2021-05-08T14:40:56","date_gmt":"2021-05-08T09:10:56","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=1795"},"modified":"2021-06-07T11:29:57","modified_gmt":"2021-06-07T05:59:57","slug":"6-unfixed-vulnerabilities-identified-in-remote-mouse-applications","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/","title":{"rendered":"6 Unfixed Vulnerabilities Identified in Remote Mouse Applications!"},"content":{"rendered":"\n<p>On Wednesday, the security researcher finds out 6 unpatched flaws in remote mouse applications and they collectively named it Mouse Trap. These six zero-days vulnerabilities were discovered in the application identified as Remote Mouse and it will permit the attacks while executing the code without the user consent.<\/p>\n\n\n\n<p>The expert also says that it is very clear that this application is very critical and it will put the user at risk while having a bad authentication process and lack of encryption is also founded with the poor default configuration.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"780\" height=\"894\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/bugs-find-in-remote-mouse-applications-image1.png\" alt=\"6 Unfixed Vulnerabilities Identified in Remote Mouse Applications worked in iOS and Android!\" class=\"wp-image-1797\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/bugs-find-in-remote-mouse-applications-image1.png 780w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/bugs-find-in-remote-mouse-applications-image1-262x300.png 262w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/bugs-find-in-remote-mouse-applications-image1-768x880.png 768w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/><\/figure><\/div>\n\n\n\n<p>Remote Mouse application is used in Android and iOS devices it will convert the mobile phone and tablets into a wireless mouse, trackpad, and keyboard for the systems. The application also provides the feature of voice typing, adjusting computer volumes, and switching between the applications that were configured in server runs on the machine.<\/p>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<p class=\"responsive-video-wrap clr\"><iframe loading=\"lazy\" title=\"MouseTrap\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/1ceS8T2Xack?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<\/div><\/figure>\n\n\n\n<p>However, this application is installed by 10 million users and the flaws identified are very critical. The experts say that the packets transmitted from the Android Application to Windows may permit the attacks to get the user&#8217;s data and hashed passwords. It will also render the suspect to a rainbow table0 and replay the commands that were sent to the device.<\/p>\n\n\n\n<p>These 6 vulnerabilities discovered are listed as follow;<\/p>\n\n\n\n<ul><li><strong>CVE-2021-27569:&nbsp;<\/strong>It will maximize or minimize the windows running process by transmitting the process name as the crafted packet.<\/li><li><strong>CVE-2021-27570:&nbsp;<\/strong>It will close the running process by sending the process named in form of a specially crafted packet.<\/li><li><strong>CVE-2021-27571:&nbsp;<\/strong>It will retrieve the recent used and running application and their file paths and icons.<\/li><li><strong>CVE-2021-27572:&nbsp;<\/strong>It will overlap the authentication using packed replay and authorize the remote attacks to execute the arbitrary code that was crafted using the UDP packets even the device is password protected.<\/li><li><strong>CVE-2021-27573:<\/strong>&nbsp;It will simply run the arbitrary code using the crafted UDP packets having no prior authentication or authorization.<\/li><li><strong>CVE-2021-27574:<\/strong>&nbsp;It will carry out the software supply-chain-attack by misusing the cleartext HTTP to examine and request further updates while resulting in the scenario where the users may download the binary that was placed in the real update.<\/li><\/ul>\n\n\n\n<p>As per the investigation, the experts also said that reported bugs in the application Remote Mouse on the 6th of February 2021 and they notified the developers too but nothing comes from their end.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On Wednesday, the security researcher finds out 6 unpatched flaws in remote mouse applications and they collectively named it Mouse Trap. These six zero-days vulnerabilities were discovered in the application identified as Remote Mouse and it will permit the attacks while executing the code without the user consent. The expert also says that it is [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1798,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>6 Unfixed Vulnerabilities Identified in Remote Mouse Applications! - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Unfixed Vulnerabilities Identified in Remote Mouse Applications! - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"On Wednesday, the security researcher finds out 6 unpatched flaws in remote mouse applications and they collectively named it Mouse Trap. These six zero-days vulnerabilities were discovered in the application identified as Remote Mouse and it will permit the attacks while executing the code without the user consent. The expert also says that it is [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-08T09:10:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T05:59:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/bugs-find-in-remote-mouse-applications-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"524\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"6 Unfixed Vulnerabilities Identified in Remote Mouse Applications!\",\"datePublished\":\"2021-05-08T09:10:56+00:00\",\"dateModified\":\"2021-06-07T05:59:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/\"},\"wordCount\":411,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/\",\"url\":\"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/\",\"name\":\"6 Unfixed Vulnerabilities Identified in Remote Mouse Applications! - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-05-08T09:10:56+00:00\",\"dateModified\":\"2021-06-07T05:59:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 Unfixed Vulnerabilities Identified in Remote Mouse Applications!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Unfixed Vulnerabilities Identified in Remote Mouse Applications! - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/","og_locale":"en_US","og_type":"article","og_title":"6 Unfixed Vulnerabilities Identified in Remote Mouse Applications! - Xiarch Solutions Private Limited","og_description":"On Wednesday, the security researcher finds out 6 unpatched flaws in remote mouse applications and they collectively named it Mouse Trap. These six zero-days vulnerabilities were discovered in the application identified as Remote Mouse and it will permit the attacks while executing the code without the user consent. The expert also says that it is [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-05-08T09:10:56+00:00","article_modified_time":"2021-06-07T05:59:57+00:00","og_image":[{"width":1000,"height":524,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/bugs-find-in-remote-mouse-applications-featured-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"6 Unfixed Vulnerabilities Identified in Remote Mouse Applications!","datePublished":"2021-05-08T09:10:56+00:00","dateModified":"2021-06-07T05:59:57+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/"},"wordCount":411,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/","url":"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/","name":"6 Unfixed Vulnerabilities Identified in Remote Mouse Applications! - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-05-08T09:10:56+00:00","dateModified":"2021-06-07T05:59:57+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/6-unfixed-vulnerabilities-identified-in-remote-mouse-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"6 Unfixed Vulnerabilities Identified in Remote Mouse Applications!"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1795"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=1795"}],"version-history":[{"count":2,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1795\/revisions"}],"predecessor-version":[{"id":1800,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1795\/revisions\/1800"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/1798"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=1795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=1795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=1795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}