mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
36 lines
1.3 KiB
JSON
36 lines
1.3 KiB
JSON
{
|
|
"id": "CVE-2024-38271",
|
|
"sourceIdentifier": "cve-coordination@google.com",
|
|
"published": "2024-06-26T16:15:11.560",
|
|
"lastModified": "2024-06-26T16:15:11.560",
|
|
"vulnStatus": "Received",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "There exists a vulnerability in Quickshare/Nearby where an attacker can force the a victim to stay connected to a temporary hotspot created for the share. As part of the sequence of packets in a QuickShare connection over Bluetooth, the attacker forces the victim to connect to the attacker\u2019s WiFi network and then sends an OfflineFrame that crashes Quick Share.\nThis makes the Wifi connection to the attacker\u2019s network last instead of returning to the old network when the Quick Share session is done allowing the attacker to be a MiTM. We recommend upgrading to version\u00a01.0.1724.0 of Quickshare or above"
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cve-coordination@google.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-404"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/google/nearby/pull/2433",
|
|
"source": "cve-coordination@google.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/google/nearby/pull/2435",
|
|
"source": "cve-coordination@google.com"
|
|
}
|
|
]
|
|
} |