Skip to main content

CVE-2022-45480: CWE-319: Cleartext Transmission of Sensitive Information in Telepad PC Keyboard WiFi & Bluetooth

Medium
Published: Fri Dec 02 2022 (12/02/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Telepad
Product: PC Keyboard WiFi & Bluetooth

Description

PC Keyboard WiFi & Bluetooth allows an attacker (in a man-in-the-middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

AI-Powered Analysis

AILast updated: 06/24/2025, 09:40:44 UTC

Technical Analysis

CVE-2022-45480 is a vulnerability identified in the Telepad PC Keyboard WiFi & Bluetooth product, affecting versions up to and including version 30. The core issue is the cleartext transmission of sensitive information, specifically keystrokes, over the network. This vulnerability falls under CWE-319, which pertains to the exposure of sensitive data due to unencrypted communication channels. An attacker positioned as a man-in-the-middle (MitM) between the keyboard device and the server can intercept and view all transmitted data in cleartext, including all keypresses. This means that any typed information—passwords, confidential messages, or other sensitive inputs—can be captured without encryption or obfuscation. The CVSS 3.1 vector for this vulnerability is AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating that the attack vector is network-based (remote), requires high attack complexity, no privileges, and no user interaction. The scope is unchanged, and the impact is high on confidentiality but none on integrity or availability. There are no known exploits in the wild, and no patches have been published by the vendor as of the data provided. The vulnerability is critical from a confidentiality standpoint but does not affect data integrity or system availability. The lack of encryption in wireless communication channels (WiFi and Bluetooth) for this keyboard product is the root cause, making it vulnerable to interception by anyone able to position themselves on the communication path, such as attackers on the same WiFi network or within Bluetooth range. This vulnerability is particularly concerning because keyboards transmit highly sensitive input data, and interception can lead to credential theft, data leakage, or further compromise of connected systems.

Potential Impact

For European organizations, the impact of CVE-2022-45480 can be significant, especially in environments where Telepad PC Keyboard WiFi & Bluetooth devices are deployed. The exposure of keystrokes in cleartext can lead to unauthorized disclosure of sensitive credentials, confidential business communications, and other private data. This can facilitate further attacks such as unauthorized access to corporate networks, data breaches, and espionage. Sectors with high security requirements—such as finance, government, healthcare, and critical infrastructure—are particularly at risk. The vulnerability could undermine compliance with data protection regulations like GDPR, as intercepted data may include personal or sensitive information. Additionally, the risk is amplified in shared or public wireless environments where attackers can more easily position themselves as MitM. Although the attack complexity is high, skilled adversaries with network access could exploit this vulnerability to compromise confidentiality without leaving traces affecting system integrity or availability. The absence of known exploits in the wild suggests limited current exploitation, but the potential impact warrants proactive mitigation.

Mitigation Recommendations

1. Immediate replacement or upgrade of Telepad PC Keyboard WiFi & Bluetooth devices to versions beyond 30 if and when patches become available. 2. Until patches are released, avoid using these keyboards in sensitive environments or on untrusted networks. Prefer wired keyboards or those with proven encrypted communication. 3. Implement network segmentation and strong WiFi security measures (WPA3, enterprise-grade authentication) to reduce the risk of MitM attacks. 4. Use VPNs or encrypted tunnels for all wireless communications involving these devices to add an additional encryption layer. 5. Monitor network traffic for unusual ARP spoofing or MitM attack indicators, especially on networks where these keyboards are used. 6. Educate users about the risks of using vulnerable wireless input devices and encourage reporting of suspicious network behavior. 7. Engage with the vendor for updates and request timely patches or firmware upgrades addressing this vulnerability. 8. Consider deploying endpoint detection and response (EDR) solutions that can detect anomalous activity resulting from credential theft or lateral movement following exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SNPS
Date Reserved
2022-11-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983fc4522896dcbf08a7

Added to database: 5/21/2025, 9:09:19 AM

Last enriched: 6/24/2025, 9:40:44 AM

Last updated: 8/11/2025, 10:50:41 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats