Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32899: CWE-1250 Improper Preservation of Consistency Between Independent Representations of Shared State in KDE KDEConnect

0
Medium
VulnerabilityCVE-2025-32899cvecve-2025-32899cwe-1250
Published: Fri Dec 05 2025 (12/05/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: KDE
Product: KDEConnect

Description

In KDE Connect before 1.33.0 on Android, a packet can be crafted that causes two paired devices to unpair. Specifically, it is an invalid discovery packet sent over broadcast UDP.

AI-Powered Analysis

AILast updated: 12/12/2025, 06:05:54 UTC

Technical Analysis

CVE-2025-32899 is a vulnerability identified in KDEConnect, a tool that facilitates seamless integration and communication between Android devices and desktop environments, particularly within the KDE ecosystem. The flaw exists in versions prior to 1.33.0 on Android platforms and is classified under CWE-1250, which pertains to improper preservation of consistency between independent representations of shared state. Specifically, the vulnerability arises when an attacker crafts a malformed discovery packet and sends it over broadcast UDP to paired devices. This crafted packet causes the two devices, which are normally paired for communication, to unpair unexpectedly. The root cause is the improper handling and validation of discovery packets, leading to inconsistent state management between the devices. The attack vector requires network-level access to send broadcast UDP packets, but no privileges or user interaction are necessary, making it relatively easy to exploit in a local network environment. The impact is limited to availability, as the pairing disruption can interrupt workflows relying on KDEConnect's device synchronization features. The CVSS v3.1 score is 4.3 (medium), reflecting low impact on confidentiality and integrity but a tangible availability impact. No patches or exploits are currently documented, but the vulnerability is publicly disclosed and should be addressed proactively.

Potential Impact

For European organizations, the primary impact of CVE-2025-32899 is the disruption of device pairing between Android devices and desktops using KDEConnect. This can lead to temporary loss of functionality such as file transfers, notifications, and remote input features that KDEConnect provides. Organizations relying on KDEConnect for productivity or operational workflows may experience interruptions, potentially affecting user efficiency. While the vulnerability does not expose sensitive data or allow code execution, the denial of service on device pairing could be exploited in environments where network access is shared or untrusted, such as public or enterprise Wi-Fi networks. This may be particularly relevant for organizations with remote or hybrid work models where device integration is critical. The lack of authentication or user interaction requirements increases the risk of opportunistic attacks within local networks. However, the absence of known exploits in the wild and the medium severity rating suggest the threat is moderate but should not be ignored.

Mitigation Recommendations

European organizations should monitor KDEConnect updates and apply version 1.33.0 or later as soon as it becomes available to remediate this vulnerability. In the interim, network administrators can reduce risk by restricting broadcast UDP traffic within local networks, especially on segments where KDEConnect devices operate. Implementing network segmentation and applying strict firewall rules to limit unnecessary UDP broadcasts can reduce exposure. Users should be educated to avoid connecting to untrusted or public Wi-Fi networks without VPN protection, as local network attackers could exploit this flaw. Additionally, organizations can consider disabling KDEConnect on Android devices if its functionality is non-essential or if alternative secure solutions exist. Monitoring network traffic for anomalous broadcast UDP packets targeting KDEConnect devices may help detect exploitation attempts. Finally, maintaining an inventory of devices running KDEConnect and their versions will aid in timely patch management and risk assessment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-04-14T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693266fdf88dbe026c734aa6

Added to database: 12/5/2025, 5:00:45 AM

Last enriched: 12/12/2025, 6:05:54 AM

Last updated: 1/19/2026, 8:46:58 PM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats