PT-2025-31704 · Localsend · Localsend
Deepunk42
·
Published
2025-08-01
·
Updated
2025-08-02
·
CVE-2025-54792
Deepunk42
·
Published
2025-08-01
·
Updated
2025-08-02
·
CVE-2025-54792
9.3
Critical
Base vector | Vector | AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H |
Name of the Vulnerable Software and Affected Versions:
LocalSend versions 1.16.1 and below
Description:
LocalSend is an open-source application designed for secure file and message sharing with nearby devices on local networks without requiring an internet connection. A critical Man-in-the-Middle (MitM) vulnerability exists in the software’s discovery protocol, allowing an unauthenticated attacker on the same local network to impersonate legitimate devices. This enables the attacker to silently intercept, read, and modify any file transfer, potentially leading to the theft of sensitive data or the injection of malware, such as ransomware. The attack is difficult to detect and relatively easy to implement, posing a significant security risk.
Recommendations:
Update to version 1.17.0 or later.
Fix
Insufficient Verification of Data Authenticity