CVE-2024-38271

4.8 MEDIUM

📋 TL;DR

This vulnerability in Quick Share/Nearby allows an attacker to force a victim's device to remain connected to the attacker's WiFi network after a file sharing session, enabling man-in-the-middle attacks. The attacker exploits Bluetooth communication during Quick Share to trigger a crash that prevents normal network reversion. Users of vulnerable Quick Share versions are affected.

💻 Affected Systems

Products:
  • Google Quick Share
  • Google Nearby Share
Versions: Versions below 1.0.1724.0
Operating Systems: Windows, Android, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires both Bluetooth and WiFi enabled, with Quick Share/Nearby active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker performs persistent man-in-the-middle attacks, intercepting sensitive data, injecting malware, or redirecting to malicious sites through the maintained WiFi connection.

🟠

Likely Case

Attacker intercepts unencrypted network traffic, potentially capturing login credentials, personal data, or session cookies from the victim's device.

🟢

If Mitigated

With proper controls like network segmentation and encrypted communications, impact is limited to temporary connection disruption.

🌐 Internet-Facing: MEDIUM - Requires proximity via Bluetooth and WiFi, but can affect devices in public spaces.
🏢 Internal Only: LOW - Requires physical proximity and specific conditions, making internal exploitation less likely.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires proximity via Bluetooth and specific packet sequence timing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.1724.0 or above

Vendor Advisory: https://github.com/google/nearby/pull/2402

Restart Required: Yes

Instructions:

1. Open Quick Share/Nearby settings. 2. Check current version. 3. Update to version 1.0.1724.0 or higher via official app store or update mechanism. 4. Restart the application or device.

🔧 Temporary Workarounds

Disable Quick Share/Nearby

all

Temporarily disable the vulnerable feature until patched.

Disable automatic WiFi connections

all

Prevent automatic connection to new WiFi networks during file sharing.

🧯 If You Can't Patch

  • Disable Bluetooth when not in use to prevent initial exploitation.
  • Use VPN for all network traffic to encrypt communications even if redirected.

🔍 How to Verify

Check if Vulnerable:

Check Quick Share/Nearby version in application settings; if below 1.0.1724.0, it is vulnerable.

Check Version:

Check via app settings UI; no universal command-line command available.

Verify Fix Applied:

Confirm version is 1.0.1724.0 or higher after update and test Quick Share functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected WiFi network switches during Quick Share sessions
  • Quick Share/Nearby application crashes

Network Indicators:

  • Devices connecting to unfamiliar WiFi SSIDs after file transfers
  • Unusual Bluetooth packet sequences

SIEM Query:

Search for events where WiFi network changes coincide with Quick Share/Nearby activity or crashes.

🔗 References

📤 Share & Export