First published: Wed Jun 26 2024(Updated: )
There exists a vulnerability in Quick Share/Nearby, where an attacker can force a victim to stay connected to a temporary hotspot created for the sharing. As part of the sequence of packets in a Quick Share connection over Bluetooth, the attacker forces the victim to connect to the attacker’s WiFi network and then sends an OfflineFrame that crashes Quick Share. This makes the Wifi connection to the attacker’s network last, instead of returning to the old network when the Quick Share session completes, allowing the attacker to be a MiTM. We recommend upgrading to version 1.0.1724.0 of Quick Share or above
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Nearby | <1.0.1724.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38271 is considered a high severity vulnerability due to the potential for unauthorized connection to a temporary hotspot.
To fix CVE-2024-38271, update your Google Nearby application to the latest version that addresses this vulnerability.
CVE-2024-38271 affects Google Nearby versions prior to 1.0.1724.0.
Yes, CVE-2024-38271 can potentially lead to data theft as an attacker could exploit the connection to intercept data during the sharing process.
A temporary workaround for CVE-2024-38271 includes disabling Bluetooth sharing features until a patch is applied.