CVE-2024-13186

7.5 HIGH

📋 TL;DR

The MinigameCenter module has insufficient URL loading restrictions, allowing attackers to load arbitrary URLs and potentially leak sensitive information. This affects systems running vulnerable versions of the MinigameCenter module, potentially exposing user data or system information.

💻 Affected Systems

Products:
  • MinigameCenter module
Versions: Specific versions not detailed in advisory; check vendor advisory for affected versions
Operating Systems: Android-based systems (Vivo devices)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Vivo devices with the vulnerable MinigameCenter module installed. The vulnerability exists in the URL loading mechanism.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete information disclosure including user credentials, session tokens, or sensitive system data through URL redirection attacks.

🟠

Likely Case

Partial information leakage such as user identifiers, device information, or limited system metadata through crafted URL requests.

🟢

If Mitigated

Minimal impact with proper input validation and URL whitelisting in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting malicious URLs that bypass the module's restrictions. No public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Vivo security advisory for specific patched versions

Vendor Advisory: https://www.vivo.com/en/support/security-advisory-detail?id=16

Restart Required: No

Instructions:

1. Visit the Vivo security advisory page. 2. Identify if your device/model is affected. 3. Apply the latest system update from Vivo. 4. Verify the update installed successfully.

🔧 Temporary Workarounds

Disable MinigameCenter module

Android

Temporarily disable or remove the MinigameCenter module to prevent exploitation

adb shell pm disable com.vivo.minigamecenter

Restrict network access

all

Use firewall rules to restrict the module's network access

🧯 If You Can't Patch

  • Implement network segmentation to isolate affected devices
  • Monitor for unusual URL loading patterns in network traffic

🔍 How to Verify

Check if Vulnerable:

Check device settings for MinigameCenter version and compare with Vivo's advisory

Check Version:

adb shell dumpsys package com.vivo.minigamecenter | grep versionName

Verify Fix Applied:

Verify system update installed and MinigameCenter module version matches patched version

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL loading patterns in MinigameCenter logs
  • Multiple failed URL validation attempts

Network Indicators:

  • Unexpected outbound connections from MinigameCenter to unusual domains
  • URL redirection patterns

SIEM Query:

source="minigamecenter" AND (url_contains="sensitive" OR url_pattern="*://*")

🔗 References

📤 Share & Export