CVE-2024-4405

9.6 CRITICAL

📋 TL;DR

This is a cross-site scripting (XSS) vulnerability in Xiaomi Pro 13 smartphones that allows remote code execution. Attackers can inject malicious scripts via the manual-upgrade.html file when users visit malicious pages or open malicious files. Only Xiaomi Pro 13 users are affected.

💻 Affected Systems

Products:
  • Xiaomi Pro 13 smartphone
Versions: Specific versions not specified in advisory
Operating Systems: Android-based MIUI
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the mimarket application's manual-upgrade.html component

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing data theft, surveillance, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Session hijacking, credential theft, data exfiltration, and installation of additional malware payloads.

🟢

If Mitigated

Limited to isolated browser session compromise if proper sandboxing and security controls are active.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

User interaction required (visiting malicious page or opening malicious file)

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-418/

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > About phone > System update. 2. Install any available updates. 3. Restart device after installation.

🔧 Temporary Workarounds

Disable JavaScript in Browser

all

Prevents script execution in web browser

Use Alternative Browser

all

Use browsers with strong XSS protection

🧯 If You Can't Patch

  • Avoid clicking unknown links or opening untrusted files
  • Use device in restricted mode with minimal permissions

🔍 How to Verify

Check if Vulnerable:

Check if manual-upgrade.html exists in mimarket app and test for XSS in manualUpgradeInfo parameter

Check Version:

Settings > About phone > MIUI version

Verify Fix Applied:

Verify system version is updated and test XSS payloads no longer execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript execution in browser logs
  • Suspicious file access patterns

Network Indicators:

  • Connections to known malicious domains after visiting suspicious pages

SIEM Query:

Not applicable for mobile devices without enterprise monitoring

🔗 References

📤 Share & Export