There exists a vulnerability in Quick Share/Nearby, where an attacker can force a victim to stay connected to a temporary hotspot created for the sharing. As part of the sequence of packets in a Quick Share connection over Bluetooth, the attacker forces the victim to connect to the attacker’s WiFi network and then sends an OfflineFrame that crashes Quick Share.
This makes the Wifi connection to the attacker’s network last, instead of returning to the old network when the Quick Share session completes, allowing the attacker to be a MiTM. We recommend upgrading to version 1.0.1724.0 of Quick Share or above
References
Link | Resource |
---|---|
https://github.com/google/nearby/pull/2402 | Issue Tracking Patch |
https://github.com/google/nearby/pull/2433 | Issue Tracking Patch |
https://github.com/google/nearby/pull/2435 | Issue Tracking Patch |
https://github.com/google/nearby/pull/2589 | Issue Tracking Patch |
Configurations
History
24 Sep 2024, 19:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/google/nearby/pull/2402 - Issue Tracking, Patch | |
References | () https://github.com/google/nearby/pull/2433 - Issue Tracking, Patch | |
References | () https://github.com/google/nearby/pull/2435 - Issue Tracking, Patch | |
References | () https://github.com/google/nearby/pull/2589 - Issue Tracking, Patch | |
CPE | cpe:2.3:a:google:nearby:*:*:*:*:*:*:*:* | |
First Time |
Google
Google nearby |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
29 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) There exists a vulnerability in Quick Share/Nearby, where an attacker can force a victim to stay connected to a temporary hotspot created for the sharing. As part of the sequence of packets in a Quick Share connection over Bluetooth, the attacker forces the victim to connect to the attacker’s WiFi network and then sends an OfflineFrame that crashes Quick Share. This makes the Wifi connection to the attacker’s network last, instead of returning to the old network when the Quick Share session completes, allowing the attacker to be a MiTM. We recommend upgrading to version 1.0.1724.0 of Quick Share or above |
27 Jun 2024, 12:47
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Jun 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-26 16:15
Updated : 2024-09-24 19:29
NVD link : CVE-2024-38271
Mitre link : CVE-2024-38271
CVE.ORG link : CVE-2024-38271
JSON object : View
Products Affected
- nearby
CWE
CWE-404
Improper Resource Shutdown or Release