CVE-2020-14127

7.5 HIGH

📋 TL;DR

This CVE describes a heap overflow vulnerability in certain Xiaomi phone models that allows remote attackers to cause denial of service. The vulnerability can be exploited remotely without authentication, potentially crashing affected devices. Users of vulnerable Xiaomi phone models are affected.

💻 Affected Systems

Products:
  • Xiaomi smartphones (specific models not detailed in public advisory)
Versions: Specific MIUI versions prior to patch (exact versions not specified in public advisory)
Operating Systems: Android with MIUI skin
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects certain Xiaomi phone models, but exact model list is not publicly detailed in the advisory

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring physical reboot, potential for remote code execution if heap overflow can be controlled precisely

🟠

Likely Case

Device becomes unresponsive or reboots unexpectedly, disrupting phone functionality

🟢

If Mitigated

No impact if patched or if vulnerable component is not exposed to untrusted networks

🌐 Internet-Facing: HIGH - Can be exploited remotely without authentication
🏢 Internal Only: MEDIUM - Could be exploited via local network or malicious apps

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Heap overflow vulnerabilities require precise exploitation but remote unauthenticated access lowers barrier

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: MIUI security updates released in 2020 (exact version depends on device model)

Vendor Advisory: https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=169

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > About phone > System update. 2. Install available security updates. 3. Reboot device after update completes.

🔧 Temporary Workarounds

Network isolation

all

Restrict device network access to trusted networks only

Disable unnecessary services

all

Turn off Bluetooth, WiFi when not needed to reduce attack surface

🧯 If You Can't Patch

  • Replace device with updated model or different manufacturer
  • Use device only on isolated, trusted networks with strict firewall rules

🔍 How to Verify

Check if Vulnerable:

Check MIUI version in Settings > About phone > MIUI version and compare with latest available security update

Check Version:

Settings > About phone > MIUI version (no CLI command available on consumer devices)

Verify Fix Applied:

Verify MIUI version is updated to latest security patch level and no unexpected crashes occur

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • System crash logs
  • Memory corruption errors in system logs

Network Indicators:

  • Unusual network traffic to device on unexpected ports
  • Connection attempts followed by device unresponsiveness

SIEM Query:

Device logs showing repeated crashes or reboots within short timeframes

🔗 References

📤 Share & Export