#VU48709 Spoofing attack in KDE Connect

 

#VU48709 Spoofing attack in KDE Connect

Published: October 7, 2020 / Updated: November 30, 2020


Vulnerability identifier: #VU48709
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: N/A
CWE-ID: CWE-451
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vulnerable software:
KDE Connect
Software vendor:
KDE.org

Description

The vulnerability allows a remote attacker to perform a spoofing attack.

The vulnerability exists due to the GUI component in KDE Connect presents only the friendly "deviceName"  identifier to identify the pair during connection. The device name is sent in clear text in UDP broadcast messages for all nodes in the same network segment. A remote attacker can obtain the device name of a real system in the network and later use it in a spoofing attack.


Remediation

Install updates from vendor's website.

External links