Vulnerability identifier: #VU48709
Vulnerability risk: Medium
CVSSv3.1: 6.4 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-451
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
KDE Connect
Operating systems & Components /
Operating system package or component
Vendor: KDE.org
Description
The vulnerability allows a remote attacker to perform a spoofing attack.
The vulnerability exists due to the GUI component in KDE Connect presents only the friendly "deviceName" identifier to identify the pair during connection. The device name is sent in clear text in UDP broadcast messages for all nodes in the same network segment. A remote attacker can obtain the device name of a real system in the network and later use it in a spoofing attack.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
KDE Connect: 20.03.80 - 20.11.80
External links
http://seclists.org/oss-sec/2020/q4/169
http://github.com/KDE/kdeconnect-kde/commit/e7518493df7398f27f7dffbfc3f79750bc1fda50
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.