{"id":44719,"date":"2025-05-26T14:45:42","date_gmt":"2025-05-26T14:45:42","guid":{"rendered":""},"modified":"2025-06-28T11:21:31","modified_gmt":"2025-06-28T17:21:31","slug":"cve-2024-45351-xiaomi-game-center-application-code-execution-vulnerability","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2024-45351-xiaomi-game-center-application-code-execution-vulnerability\/","title":{"rendered":"<strong>CVE-2024-45351: Xiaomi Game Center Application Code Execution Vulnerability<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>A critical vulnerability has been discovered in the Xiaomi Game center application product, affecting users globally. Designated as CVE-2024-45351, this security issue opens the door for cyber attackers to execute malicious code, potentially compromising system integrity or leaking sensitive data. This <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5484-widespread-vulnerability-in-sinotrack-device-management-interface\/\"  data-wpil-monitor-id=\"62099\">vulnerability matters because of the widespread<\/a> usage of Xiaomi Game Center, and the high severity of the potential impact, making it a significant threat to user data and privacy.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2024-45351<br \/>\nSeverity: High (7.8 CVSS score)<br \/>\nAttack Vector: Remote<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: Required<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-52880-critical-vulnerability-in-insyde-insydeh2o-kernels-potentially-leading-to-system-compromise\/\"  data-wpil-monitor-id=\"51668\">Potential system<\/a> compromise and data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-2082283063\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Xiaomi Game Center | All <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-48865-manipulation-of-x-forwarded-headers-in-fabio-prior-to-version-1-6-6\/\"  data-wpil-monitor-id=\"58313\">versions prior<\/a> to patch release<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-49563-improper-neutralization-exploit-in-dell-unity-leads-to-privilege-escalation\/\"  data-wpil-monitor-id=\"56787\">exploit takes advantage of improper<\/a> input validation in the Xiaomi Game Center application. When a user interacts with a malicious entity (say, by clicking on a tainted link or opening a compromised file), the attacker can <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-55063-critical-code-injection-vulnerabilities-in-easyvirt-dc-netscope\/\"  data-wpil-monitor-id=\"51667\">inject malicious code<\/a> into the application. This <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3053-remote-code-execution-vulnerability-in-uipress-lite-wordpress-plugin\/\"  data-wpil-monitor-id=\"50125\">code can then be executed<\/a>, giving the attacker the ability to compromise the system or exfiltrate data.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-2308037075\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here&#8217;s a conceptual example of how an <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5353-local-authenticated-attacker-exploit-in-ivanti-workspace-control\/\"  data-wpil-monitor-id=\"62100\">attacker might exploit<\/a> this vulnerability. This pseudocode represents a <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-24274-input-validation-issue-exploitable-via-malicious-app-on-macos\/\"  data-wpil-monitor-id=\"62101\">malicious payload being injected into the app<\/a> through user interaction.<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/XiaomiGameCenter\/endpoint HTTP\/1.1\nHost: target.example.com\nContent-Type: application\/json\n{ &quot;malicious_payload&quot;: &quot;&lt;CODE TO COMPROMISE SYSTEM OR EXFILTRATE DATA&gt;&quot; }<\/code><\/pre>\n<p>In this example, the malicious_payload value would contain the attacker&#8217;s code, designed to exploit the application&#8217;s weak input validation and <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-51360-remote-code-execution-vulnerability-in-hospital-management-system-in-php-v4-0\/\"  data-wpil-monitor-id=\"54348\">execute harmful actions on the system<\/a>.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>Users are strongly advised to apply the vendor patch, which has been released to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-49842-critical-memory-corruption-vulnerability-in-protected-vm-address-space\/\"  data-wpil-monitor-id=\"62102\">address this vulnerability<\/a>. Until the patch can be applied, users can use a Web Application Firewall (WAF) or Intrusion Detection System (IDS) as a temporary mitigation measure. These systems can help detect and block the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-24189-memory-corruption-vulnerability-due-to-maliciously-crafted-web-content-in-various-operating-systems\/\"  data-wpil-monitor-id=\"54349\">malicious traffic exploiting this vulnerability<\/a>, providing a layer of protection while the permanent fix is being implemented.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview A critical vulnerability has been discovered in the Xiaomi Game center application product, affecting users globally. Designated as CVE-2024-45351, this security issue opens the door for cyber attackers to execute malicious code, potentially compromising system integrity or leaking sensitive data. This vulnerability matters because of the widespread usage of Xiaomi Game Center, and the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-44719","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/44719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=44719"}],"version-history":[{"count":6,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/44719\/revisions"}],"predecessor-version":[{"id":55772,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/44719\/revisions\/55772"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=44719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=44719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=44719"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=44719"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=44719"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=44719"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=44719"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=44719"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=44719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}