Description

Multiple security vulnerabilities have been revealed in various applications and system components on Xiaomi devices running Android. According to a report from mobile security firm Oversecured, these vulnerabilities granted unauthorized access to activities, receivers, and services with system privileges, allowed theft of arbitrary files with system privileges, and exposed sensitive phone, settings, and Xiaomi account data. The affected apps and components include Gallery, GetApps, Mi Video, MIUI Bluetooth, Phone Services, Print Spooler, Security, Security Core Component, Settings, ShareMe, System Tracing, and Xiaomi Cloud. Some notable flaws identified in these components include a shell command injection vulnerability in System Tracing and vulnerabilities in the Settings app that could lead to theft of files and disclosure of Bluetooth device information, Wi-Fi network details, and emergency contact data. Although Phone Services, Print Spooler, Settings, and System Tracing are legitimate components from the Android Open Source Project (AOSP), they have been modified by Xiaomi, resulting in these security issues. One concerning finding is a memory corruption flaw in the GetApps app, derived from the LiveEventBus Android library, reported to project maintainers over a year ago but still unpatched. Additionally, the Mi Video app's use of implicit intents to transmit Xiaomi account details via broadcasts raises interception risks. These vulnerabilities were reported to Xiaomi between April 25 and April 30, 2024, and users are advised to install the latest updates to mitigate these security risks.