CVE-2020-9531
Summary
| CVE | CVE-2020-9531 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-03-06 17:15:00 UTC |
| Updated | 2022-01-01 18:43:00 UTC |
| Description | An issue was discovered on Xiaomi MIUI V11.0.5.0.QFAEUXM devices. In the Web resources of GetApps(com.xiaomi.mipicks), the parameters passed in are read and executed. After reading the resource files, relevant components open the link of the incoming URL. Although the URL is safe and can pass security detection, the data carried in the parameters are loaded and executed. An attacker can use NFC tools to get close enough to a user's unlocked phone to cause apps to be installed and information to be leaked. This is fixed on version: 2001122. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Mi | Miui | - | All | All | All |
| Hardware | Mi | Miui | - | All | All | All |
| Operating System | Mi | Miui Firmware | 11.0.5.0.qfaeuxm | All | All | All |
| Operating System | Mi | Miui Firmware | 11.0.5.0.qfaeuxm | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| ZDI-20-287 | Zero Day Initiative | MISC | www.zerodayinitiative.com | |
| 小米安全中心 | MISC | sec.xiaomi.com | Vendor Advisory |
| ZDI-20-288 | Zero Day Initiative | MISC | www.zerodayinitiative.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.