Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 05 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 05 Dec 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apple
Apple ios Google android Kde Kde gsconnect Kde kde Kde kdeconnect Kde valent |
|
| Vendors & Products |
Apple
Apple ios Google android Kde Kde gsconnect Kde kde Kde kdeconnect Kde valent |
Fri, 05 Dec 2025 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The KDE Connect verification-code protocol before 2025-04-18 uses only 8 characters and therefore allows brute-force attacks. This affects KDE Connect before 1.33.0 on Android, KDE Connect before 25.04 on desktop, KDE Connect before 0.5 on iOS, Valent before 1.0.0.alpha.47, and GSConnect before 59. | |
| Weaknesses | CWE-331 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-05T14:40:16.425Z
Reserved: 2025-04-14T00:00:00.000Z
Link: CVE-2025-32898
Updated: 2025-12-05T14:40:13.301Z
Status : Deferred
Published: 2025-12-05T05:16:58.480
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-32898
No data.
OpenCVE Enrichment
Updated: 2025-12-05T10:51:49Z