First published: Thu Nov 14 2019(Updated: )
The Xiaomi 5S Plus Android device with a build fingerprint of Xiaomi/natrium/natrium:6.0.1/MXB48T/7.1.5:user/release-keys contains a pre-installed app with a package name of com.miui.powerkeeper app (versionCode=40000, versionName=4.0.00) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mi 5s Plus | ||
Mi 5s Plus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15426 describes a pre-installed app on the Xiaomi 5S Plus that allows unauthorized modification of wireless settings.
The severity of CVE-2019-15426 is not explicitly assigned, but it poses a significant security risk due to unauthorized access.
To mitigate CVE-2019-15426, update the affected Xiaomi 5S Plus device to the latest firmware version provided by the manufacturer.
CVE-2019-15426 specifically affects the Xiaomi 5S Plus running certain versions of Android with the app com.miui.powerkeeper.
CVE-2019-15426 can potentially allow attackers to alter network settings without user consent, compromising device security.