#VU48709 Spoofing attack in KDE Connect
Published: October 7, 2020 / Updated: November 30, 2020
KDE Connect
KDE.org
Description
The vulnerability allows a remote attacker to perform a spoofing attack.
The vulnerability exists due to the GUI component in KDE Connect presents only the friendly "deviceName" identifier to identify the pair during connection. The device name is sent in clear text in UDP broadcast messages for all nodes in the same network segment. A remote attacker can obtain the device name of a real system in the network and later use it in a spoofing attack.