Bluetooth Vulnerability Allows Attacker to Force Victim's WiFi Connection
CVE-2024-38271

4.8MEDIUM

Key Information:

Vendor
Google
Status
Vendor
CVE Published:
26 June 2024

Badges

đź“° News Worthy

Summary

There exists a vulnerability in Quickshare/Nearby where an attacker can force the a victim to stay connected to a temporary hotspot created for the share. As part of the sequence of packets in a QuickShare connection over Bluetooth, the attacker forces the victim to connect to the attacker’s WiFi network and then sends an OfflineFrame that crashes Quick Share. This makes the Wifi connection to the attacker’s network last instead of returning to the old network when the Quick Share session is done allowing the attacker to be a MiTM. We recommend upgrading to version 1.0.1724.0 of Quickshare or above

Affected Version(s)

Nearby 0 < 1.0.1724.0

News Articles

Google Quick Share Bug Bypasses Allow 0-Click File Transfer

Google addresses patch bypasses for CVE-2024-38272 and CVE-2024-38271, part of the previously announced &quot;QuickShell&quot; silent RCE attack chain against Windows users.

2 weeks ago

References

CVSS V3.1

Score:
4.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • đź“°

    First article discovered

  • Vulnerability published

  • Vulnerability Reserved

.