Логотип exploitDog
bind:CVE-2024-38271
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-38271

Количество 3

Количество 3

nvd логотип

CVE-2024-38271

больше 1 года назад

There exists a vulnerability in Quick Share/Nearby, where an attacker can force a victim to stay connected to a temporary hotspot created for the sharing. As part of the sequence of packets in a Quick Share connection over Bluetooth, the attacker forces the victim to connect to the attacker’s WiFi network and then sends an OfflineFrame that crashes Quick Share. This makes the Wifi connection to the attacker’s network last, instead of returning to the old network when the Quick Share session completes, allowing the attacker to be a MiTM. We recommend upgrading to version 1.0.1724.0 of Quick Share or above

CVSS3: 4.8
EPSS: Низкий
github логотип

GHSA-6pfp-pc86-29qj

больше 1 года назад

There exists a vulnerability in Quickshare/Nearby where an attacker can force the a victim to stay connected to a temporary hotspot created for the share. As part of the sequence of packets in a QuickShare connection over Bluetooth, the attacker forces the victim to connect to the attacker’s WiFi network and then sends an OfflineFrame that crashes Quick Share. This makes the Wifi connection to the attacker’s network last instead of returning to the old network when the Quick Share session is done allowing the attacker to be a MiTM. We recommend upgrading to version 1.0.1724.0 of Quickshare or above

EPSS: Низкий
fstec логотип

BDU:2025-05013

почти 2 года назад

Уязвимость функции для передачи данных Nearby Share утилиты обмена данными между устройствами Google Quick Share, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-38271

There exists a vulnerability in Quick Share/Nearby, where an attacker can force a victim to stay connected to a temporary hotspot created for the sharing. As part of the sequence of packets in a Quick Share connection over Bluetooth, the attacker forces the victim to connect to the attacker’s WiFi network and then sends an OfflineFrame that crashes Quick Share. This makes the Wifi connection to the attacker’s network last, instead of returning to the old network when the Quick Share session completes, allowing the attacker to be a MiTM. We recommend upgrading to version 1.0.1724.0 of Quick Share or above

CVSS3: 4.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-6pfp-pc86-29qj

There exists a vulnerability in Quickshare/Nearby where an attacker can force the a victim to stay connected to a temporary hotspot created for the share. As part of the sequence of packets in a QuickShare connection over Bluetooth, the attacker forces the victim to connect to the attacker’s WiFi network and then sends an OfflineFrame that crashes Quick Share. This makes the Wifi connection to the attacker’s network last instead of returning to the old network when the Quick Share session is done allowing the attacker to be a MiTM. We recommend upgrading to version 1.0.1724.0 of Quickshare or above

0%
Низкий
больше 1 года назад
fstec логотип
BDU:2025-05013

Уязвимость функции для передачи данных Nearby Share утилиты обмена данными между устройствами Google Quick Share, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.8
0%
Низкий
почти 2 года назад

Уязвимостей на страницу