First published: Fri Mar 06 2020(Updated: )
An issue was discovered on Xiaomi MIUI V11.0.5.0.QFAEUXM devices. In the Web resources of GetApps(com.xiaomi.mipicks), the parameters passed in are read and executed. After reading the resource files, relevant components open the link of the incoming URL. Although the URL is safe and can pass security detection, the data carried in the parameters are loaded and executed. An attacker can use NFC tools to get close enough to a user's unlocked phone to cause apps to be installed and information to be leaked. This is fixed on version: 2001122.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mi Miui Firmware | =11.0.5.0.qfaeuxm | |
mi MIUI | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Xiaomi GetApps vulnerability is CVE-2020-9531.
The severity of CVE-2020-9531 is high with a CVSS score of 7.3.
Xiaomi MIUI V11.0.5.0.QFAEUXM devices, Xiaomi Mi6, and Xiaomi Browser are affected by CVE-2020-9531.
In the Web resources of GetApps, the parameters passed in are read and executed, allowing for privilege escalation.
Yes, Xiaomi has released a patch for this vulnerability. It is recommended to update to the latest version.