First published: Thu Mar 05 2020(Updated: )
An issue was discovered on XIAOMI AI speaker MDZ-25-DT 1.34.36, and 1.40.14. Attackers can get root shell by accessing the UART interface and then they can read Wi-Fi SSID or password, read the dialogue text files between users and XIAOMI AI speaker, use Text-To-Speech tools pretend XIAOMI speakers' voice achieve social engineering attacks, eavesdrop on users and record what XIAOMI AI speaker hears, delete the entire XIAOMI AI speaker system, modify system files, stop voice assistant service, start the XIAOMI AI speaker’s SSH service as a backdoor
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mi Mdz-25-dt | =1.34.36 | |
Mi Mdz-25-dt | =1.40.14 | |
Mi Mdz-25-dt Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8994 is classified as a critical vulnerability due to the potential for attackers to gain root access to the device.
To mitigate CVE-2020-8994, update your Xiaomi AI speaker firmware to a version that is not vulnerable, such as versions beyond 1.40.14.
CVE-2020-8994 affects Xiaomi AI speaker models using firmware versions 1.34.36 and 1.40.14.
An attacker exploiting CVE-2020-8994 can gain root shell access and retrieve sensitive information such as Wi-Fi credentials and dialogue text files.
There is no reliable workaround for CVE-2020-8994 other than updating to a secure firmware version.