The system was found to have the drivers for an insecure wireless keyboard installed.
Certain non-Bluetooth wireless keyboards (including some manufactured by Microsoft and Logitech)
are designed with very weak encryption that is trivially easy to defeat. The result is that
a remote attacker equipped with a laptop and a small antenna can capture every keystroke from
all wireless keyboards operating within at least a 10m (32ft) radius (through walls and floors).
With a more powerful antenna, keystrokes can likely be captured from much farther away.
This vulnerability stems from a fundamental design flaw in the RF protocol used by
these 27MHz wireless devices, causing them to be even less secure than Bluetooth-based
Note that due to the mechanisms used to detect this vulnerability on Windows systems,
it is possible that the device is no longer actively connected to the system (although
it is certain that the device WAS connected to the system in the past). This is still
important when you consider that laptops with sensitive company data are frequently
taken off-site and connected to other peripherals (for example, a user who plugs the
his company laptop into a wireless keyboard at home).