CVE-2024-45347

9.6 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication in Xiaomi Mi Connect Service APP due to flawed validation logic, enabling unauthorized access to victim's devices. It affects users of Xiaomi devices running the vulnerable Mi Connect Service application.

💻 Affected Systems

Products:
  • Xiaomi Mi Connect Service APP
Versions: Specific vulnerable versions not detailed in advisory
Operating Systems: Android-based Xiaomi devices
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Xiaomi devices with Mi Connect Service enabled. Exact device models and Android versions not specified in available advisory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing data theft, surveillance, malware installation, and remote control of affected Xiaomi devices.

🟠

Likely Case

Unauthorized access to device data, personal information exposure, and potential privilege escalation on the compromised device.

🟢

If Mitigated

Limited impact if network segmentation and strict access controls prevent external connections to the vulnerable service.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-287 (Improper Authentication) suggests authentication bypass is possible without credentials. No public exploit details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory

Vendor Advisory: https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=548

Restart Required: Yes

Instructions:

1. Update Xiaomi Mi Connect Service APP via official app store. 2. Update device firmware to latest version. 3. Restart device after updates.

🔧 Temporary Workarounds

Disable Mi Connect Service

android

Temporarily disable the vulnerable service until patched

Network Isolation

all

Restrict network access to device using firewall rules

🧯 If You Can't Patch

  • Disable Mi Connect Service feature in device settings
  • Implement strict network segmentation to isolate affected devices from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check Mi Connect Service APP version in device settings. If not updated after CVE publication date, assume vulnerable.

Check Version:

Settings > Apps > Mi Connect Service > App info

Verify Fix Applied:

Verify Mi Connect Service APP is updated to latest version and check for any security bulletins from Xiaomi.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized authentication attempts to Mi Connect Service
  • Unexpected service connections from unknown IPs

Network Indicators:

  • Unusual outbound connections from device
  • Traffic to/from Mi Connect Service ports from unexpected sources

SIEM Query:

source="android_device" AND app="Mi Connect Service" AND (event_type="auth_failure" OR event_type="unauthorized_access")

🔗 References

📤 Share & Export