Researchers at Intel discovered a critical escalation of privilege vulnerability (CVE-2018-3641) in all versions of Intel’s popular Remote Keyboard app. Successful exploitation of this vulnerability could allow threat actors to execute malicious code and inject keystrokes into remote keyboard sessions as the local user. The app, available on iOS and Android, allows devices to control Next Unit of Computing (NUC) and Compute stick devices used in classrooms, kiosks, and network computer environments through the peer-to-peer network protocol Wi-Fi Direct. Intel has identified two additional vulnerabilities (CVE-2018-3645, CVE-2018-3638) in their advisory that, if exploited, could allow a threat actor to gain access as a privileged user. After discovering these vulnerabilities, Intel has announced that they are discontinuing the Remote Keyboard app. The NJCCIC recommends all users of the Intel Remote Keyboard app review Intel’s security report and uninstall the app immediately.