First published: Thu Nov 14 2019(Updated: )
The Xiaomi Mi A3 Android device with a build fingerprint of xiaomi/onc_eea/onc:9/PKQ1.181021.001/V10.2.8.0.PFLEUXM:user/release-keys contains a pre-installed app with a package name of com.qualcomm.qti.callenhancement app (versionCode=28, versionName=9) that allows unauthorized microphone audio recording via a confused deputy attack. This capability can be accessed by any app co-located on the device. This app allows a third-party app to use its open interface to record telephone calls to external storage.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mi A3 | ||
Mi A3 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15475 has a moderate severity level due to its potential to allow unauthorized audio recording.
To mitigate CVE-2019-15475, users should uninstall or disable the vulnerable Qualcomm call enhancement app if possible.
CVE-2019-15475 specifically affects the Xiaomi Mi A3 device with the mentioned build fingerprint.
CVE-2019-15475 poses significant privacy risks as it enables unauthorized access to microphone audio.
As of now, there is no publicly disclosed patch specifically addressing CVE-2019-15475.