Rapid7 Vulnerability & Exploit Database

MFSA2011-45 Firefox: Inferring Keystrokes from motion data

Back to Search

MFSA2011-45 Firefox: Inferring Keystrokes from motion data

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
09/27/2011
Created
07/25/2018
Added
11/21/2013
Modified
11/21/2013

Description

University of California, Davis researchers and presented a paper at the 2011 USENIX HotSec workshop on inferring keystrokes from device motion data on mobile devices. Web pages can now receive data similar to the apps studied in that paper and likely present a similar risk. We have decided to limit motion data events to the currently-active tab to prevent the possibility of background tabs attempting to decipher keystrokes the user is entering into the foreground tab.

Solution(s)

  • mozilla-firefox-upgrade-7_0

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;