#VU107599 Improper Authentication in KDE.org products - CVE-2025-32898
Published: April 18, 2025
KDE Connect
KDE Connect Android
KDE Connect iOS
KDE.org
Description
The vulnerability allows an attacker to bypass authentication process.
The vulnerability exists due to usage of a weak authentication mechanism when pairing devices. KDE Connect displays an 8-character-long verification code when pairing two devices that is generated from the devices public keys. An attacker with physical proximity to device can brute-force the a key pair such that the resulting verification code matches the one of another device they try to impersonate.
Note, this attack can be launched remotely if an attacker has a presence in the victim's network through a compromised system.