Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 05 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 05 Dec 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apple
Apple ios Google android Kde Kde gsconnect Kde kde Kde kdeconnect Kde valent |
|
| Vendors & Products |
Apple
Apple ios Google android Kde Kde gsconnect Kde kde Kde kdeconnect Kde valent |
Fri, 05 Dec 2025 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The KDE Connect verification-code protocol before 2025-04-18 uses only 8 characters and therefore allows brute-force attacks. This affects KDE Connect before 1.33.0 on Android, KDE Connect before 25.04 on desktop, KDE Connect before 0.5 on iOS, Valent before 1.0.0.alpha.47, and GSConnect before 59. | |
| Weaknesses | CWE-331 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-05T14:40:16.425Z
Reserved: 2025-04-14T00:00:00.000Z
Link: CVE-2025-32898
Updated: 2025-12-05T14:40:13.301Z
Status : Awaiting Analysis
Published: 2025-12-05T05:16:58.480
Modified: 2025-12-08T18:27:15.857
Link: CVE-2025-32898
No data.
OpenCVE Enrichment
Updated: 2025-12-05T10:51:49Z