Public Advisories

The plain-text public advisories can be found at CERT/CC VU#981271.


- Immediately disconnect all affected USB dongles, and use wired keyboards and mice instead.

- If you are using affected Logitech or 'Lenovo 500' devices, please update your firmware by referring to the appropriate instructions (see appropriate Vendor Response links above).

Dongles from other vendors were not found to support upgrading of firmware, so it does not appear possible to patch them. Therefore it is recommended that users contact their preferred vendor and inquire into which models are not vulnerable for future purchases.


The Bastille Threat Research Team is releasing free, open source tools to enable interested parties to discover wireless mice and keyboards that may be vulnerable to MouseJack.

Please refer to:

A Python-based sniffer is available, and will output raw frames to the console:

An Android application for sniffing is currently in development and will be released soon:




2015 November 24th

  • Initial vendor disclosure

2016 January 11th

  • CERT/CC advisory sent

2016 February 23rd

  • Public disclosure

2016 February 24th

2016 February 25th

  • Uploaded statement from Dell