Spoofing attack in KDE Connect - #VU48709

 

Spoofing attack in KDE Connect - #VU48709

Published: October 7, 2020 / Updated: November 30, 2020


Vulnerability identifier: #VU48709
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: N/A
CWE-ID: CWE-451
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vulnerable software:
KDE Connect
Software vendor:
KDE.org

Description

The vulnerability allows a remote attacker to perform a spoofing attack.

The vulnerability exists due to the GUI component in KDE Connect presents only the friendly "deviceName"  identifier to identify the pair during connection. The device name is sent in clear text in UDP broadcast messages for all nodes in the same network segment. A remote attacker can obtain the device name of a real system in the network and later use it in a spoofing attack.


Remediation

Install updates from vendor's website.

External links