CVE-2024-45347
📋 TL;DR
This vulnerability allows attackers to bypass authentication in Xiaomi Mi Connect Service APP due to flawed validation logic, enabling unauthorized access to victim's devices. It affects users of Xiaomi devices running the vulnerable Mi Connect Service application.
💻 Affected Systems
- Xiaomi Mi Connect Service APP
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing data theft, surveillance, malware installation, and remote control of affected Xiaomi devices.
Likely Case
Unauthorized access to device data, personal information exposure, and potential privilege escalation on the compromised device.
If Mitigated
Limited impact if network segmentation and strict access controls prevent external connections to the vulnerable service.
🎯 Exploit Status
CWE-287 (Improper Authentication) suggests authentication bypass is possible without credentials. No public exploit details available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in advisory
Vendor Advisory: https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=548
Restart Required: Yes
Instructions:
1. Update Xiaomi Mi Connect Service APP via official app store. 2. Update device firmware to latest version. 3. Restart device after updates.
🔧 Temporary Workarounds
Disable Mi Connect Service
androidTemporarily disable the vulnerable service until patched
Network Isolation
allRestrict network access to device using firewall rules
🧯 If You Can't Patch
- Disable Mi Connect Service feature in device settings
- Implement strict network segmentation to isolate affected devices from untrusted networks
🔍 How to Verify
Check if Vulnerable:
Check Mi Connect Service APP version in device settings. If not updated after CVE publication date, assume vulnerable.
Check Version:
Settings > Apps > Mi Connect Service > App info
Verify Fix Applied:
Verify Mi Connect Service APP is updated to latest version and check for any security bulletins from Xiaomi.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized authentication attempts to Mi Connect Service
- Unexpected service connections from unknown IPs
Network Indicators:
- Unusual outbound connections from device
- Traffic to/from Mi Connect Service ports from unexpected sources
SIEM Query:
source="android_device" AND app="Mi Connect Service" AND (event_type="auth_failure" OR event_type="unauthorized_access")