CVE-2024-45355

5.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to bypass authorization controls in Xiaomi phone frameworks, enabling unauthorized access to sensitive methods. It affects Xiaomi smartphones running vulnerable versions of their Android-based MIUI framework. Attackers could potentially access privileged functions without proper authentication.

💻 Affected Systems

Products:
  • Xiaomi smartphones with MIUI framework
Versions: Specific versions not detailed in advisory; check Xiaomi security bulletin for affected versions
Operating Systems: Android-based MIUI
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the phone framework layer; requires local access or malicious app installation

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of device security allowing access to sensitive user data, system functions, and potential privilege escalation to root/system level.

🟠

Likely Case

Unauthorized access to specific sensitive methods within the framework, potentially exposing user data or allowing manipulation of device settings.

🟢

If Mitigated

Limited impact with proper app sandboxing and security controls in place, potentially only affecting specific framework components.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation likely requires local access or malicious app with some permissions; no public exploit details available

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Xiaomi security updates for specific patched versions

Vendor Advisory: https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=553

Restart Required: Yes

Instructions:

1. Check for system updates in Settings
2. Install latest security update from Xiaomi
3. Restart device after update

🔧 Temporary Workarounds

Restrict app installations

all

Only install apps from trusted sources like official app stores

Review app permissions

all

Regularly review and restrict unnecessary app permissions

🧯 If You Can't Patch

  • Implement mobile device management (MDM) with strict app control policies
  • Use application allowlisting to prevent unauthorized app execution

🔍 How to Verify

Check if Vulnerable:

Check device security patch level in Settings > About phone > Android version

Check Version:

Settings > About phone > MIUI version

Verify Fix Applied:

Verify security patch date is after vulnerability disclosure (check Xiaomi advisory for specific dates)

📡 Detection & Monitoring

Log Indicators:

  • Unusual framework method calls
  • Authorization bypass attempts in system logs

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

Not applicable for typical mobile device deployments

🔗 References

📤 Share & Export