An issue was discovered on Xiaomi MIUI V11.0.5.0.QFAEUXM devices. In the Web resources of GetApps(com.xiaomi.mipicks), the parameters passed in are read and executed. After reading the resource files, relevant components open the link of the incoming URL. Although the URL is safe and can pass security detection, the data carried in the parameters are loaded and executed. An attacker can use NFC tools to get close enough to a user's unlocked phone to cause apps to be installed and information to be leaked. This is fixed on version: 2001122.
References
Link | Resource |
---|---|
https://sec.xiaomi.com/post/180 | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-287/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-20-288/ | Third Party Advisory VDB Entry |
https://sec.xiaomi.com/post/180 | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-287/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-20-288/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://sec.xiaomi.com/post/180 - Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-20-287/ - Third Party Advisory, VDB Entry | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-20-288/ - Third Party Advisory, VDB Entry |
Information
Published : 2020-03-06 17:15
Updated : 2024-11-21 05:40
NVD link : CVE-2020-9531
Mitre link : CVE-2020-9531
CVE.ORG link : CVE-2020-9531
JSON object : View
Products Affected
mi
- miui
- miui_firmware
CWE