CVE-2024-45356

7.3 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass authorization controls in Xiaomi phone frameworks, enabling unauthorized access to sensitive system methods. It affects Xiaomi smartphone users who haven't applied security updates, potentially exposing device functionality and user data to malicious apps.

💻 Affected Systems

Products:
  • Xiaomi smartphones with MIUI/Android framework
Versions: Specific affected versions not publicly detailed in advisory
Operating Systems: Android with MIUI framework
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default Xiaomi framework configurations; requires malicious app installation or similar attack vector

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to execute arbitrary code with system privileges, access all user data, install persistent malware, and control device functions remotely.

🟠

Likely Case

Malicious apps gaining elevated permissions to access sensitive data (contacts, messages, location), modify system settings, or perform unauthorized actions without user consent.

🟢

If Mitigated

Limited impact with proper app sandboxing and security controls, potentially allowing only minor privilege escalation within app boundaries.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation likely requires app installation or similar user interaction; no public exploit details available

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory - check latest MIUI/Android security updates

Vendor Advisory: https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=554

Restart Required: No

Instructions:

1. Open Settings app 2. Navigate to About phone > System update 3. Check for and install latest security updates 4. Ensure automatic updates are enabled for future patches

🔧 Temporary Workarounds

Restrict app installations

all

Only install apps from trusted sources like Google Play Store and disable unknown sources installation

Settings > Security > Install unknown apps > Disable for all apps

Review app permissions

all

Regularly audit and restrict app permissions to minimum required functionality

Settings > Apps > [App Name] > Permissions > Review and restrict

🧯 If You Can't Patch

  • Implement mobile device management (MDM) with strict app whitelisting policies
  • Deploy network segmentation to isolate vulnerable devices from critical resources

🔍 How to Verify

Check if Vulnerable:

Check MIUI version in Settings > About phone and compare with latest security bulletin from Xiaomi

Check Version:

adb shell getprop ro.build.version.incremental

Verify Fix Applied:

Verify latest security patch level in Settings > About phone > Android security patch level

📡 Detection & Monitoring

Log Indicators:

  • Unusual permission requests in app logs
  • Framework method access violations
  • Security manager exceptions

Network Indicators:

  • Unexpected outbound connections from system apps
  • Communication with unknown domains

SIEM Query:

source="android_system" AND (event_type="permission_violation" OR event_type="framework_access")

🔗 References

📤 Share & Export