{"id":55561,"date":"2025-06-27T21:17:06","date_gmt":"2025-06-27T21:17:06","guid":{"rendered":""},"modified":"2025-08-31T18:37:30","modified_gmt":"2025-09-01T00:37:30","slug":"cve-2024-45347-unauthorized-access-vulnerability-in-xiaomi-mi-connect-service-app","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2024-45347-unauthorized-access-vulnerability-in-xiaomi-mi-connect-service-app\/","title":{"rendered":"<strong>CVE-2024-45347: Unauthorized Access Vulnerability in Xiaomi Mi Connect Service APP<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>CVE-2024-45347 is a critical cybersecurity vulnerability that affects the Xiaomi Mi Connect Service APP. This vulnerability allows unauthorized access to the victim&#8217;s device, potentially leading to a system compromise or data leakage. It is a significant threat due to the wide usage of Xiaomi devices globally, and the fact that the flaw lies in a service APP that is integral to the device&#8217;s operation magnifies the risk. The severity and the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5484-widespread-vulnerability-in-sinotrack-device-management-interface\/\"  data-wpil-monitor-id=\"62093\">widespread possible impact of this vulnerability<\/a> make it crucial for users to understand and address it promptly.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2024-45347<br \/>\nSeverity: Critical (CVSS Score: 9.6)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: Unauthorized access to the victim&#8217;s device, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49415-path-traversal-vulnerability-in-fw-gallery-with-potential-for-system-compromise\/\"  data-wpil-monitor-id=\"62456\">potential system<\/a> compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-3431354897\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Xiaomi Mi Connect Service APP | All <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49137-critical-vulnerability-in-hax-cms-php-prior-to-version-11-0-0\/\"  data-wpil-monitor-id=\"62094\">versions prior<\/a> to patch<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The vulnerability is a result of flawed validation logic within the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-22460-privilege-escalation-vulnerability-in-ivanti-cloud-services-application\/\"  data-wpil-monitor-id=\"64707\">Xiaomi Mi Connect Service<\/a> APP. Attackers can exploit this flaw to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49216-critical-authentication-bypass-vulnerability-in-trend-micro-endpoint-encryption-policyserver\/\"  data-wpil-monitor-id=\"62685\">bypass the standard authentication<\/a> mechanisms and gain unauthorized access to the victim&#8217;s device. Once the attacker has access, they may <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6510-critical-vulnerability-in-netgear-ex6100-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"63686\">potentially compromise the system<\/a> or leak sensitive data.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-2934260569\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here is a conceptual example to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49526-out-of-bounds-write-vulnerability-in-illustrator-leading-to-arbitrary-code-execution\/\"  data-wpil-monitor-id=\"75266\">illustrate how this vulnerability<\/a> might be exploited. This pseudocode represents an attempt by an attacker to access the device by <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6433-critical-tls-certificate-validation-bypass-in-firefox\/\"  data-wpil-monitor-id=\"65338\">bypassing the flawed validation<\/a> logic:<\/p>\n<pre><code class=\"\" data-line=\"\">def exploit(target_device):\nsend_request_to_device(target_device, {\n&quot;command&quot;: &quot;AUTH&quot;,\n&quot;params&quot;: {\n&quot;validation_data&quot;: &quot;malicious_data_bypassing_validation&quot;\n}\n})<\/code><\/pre>\n<p>This pseudocode sends an &#8220;AUTH&#8221; command to the target device, with parameters that <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52890-critical-acl-bypass-vulnerability-in-incus-system-container-and-virtual-machine-manager\/\"  data-wpil-monitor-id=\"64740\">contain malicious data crafted to bypass<\/a> the flawed validation logic. This would result in <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5071-unauthorized-access-and-data-modification-vulnerability-in-ai-engine-wordpress-plugin\/\"  data-wpil-monitor-id=\"62834\">unauthorized access<\/a> to the device.<\/p>\n<p><strong>Mitigation<\/strong><\/p>\n<p>The primary method of <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-39486-rankie-sql-injection-vulnerability-and-mitigation-measures\/\"  data-wpil-monitor-id=\"62457\">mitigation for this vulnerability<\/a> is to apply the vendor patch as soon as it is available. Xiaomi is expected to release an update to fix this flaw in the Mi Connect Service APP. Until the patch is available, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-50738-memos-application-vulnerability-allows-for-unauthorized-user-information-disclosure\/\"  data-wpil-monitor-id=\"69622\">users are advised to utilize a Web Application<\/a> Firewall (WAF) or Intrusion Detection System (IDS) as a temporary mitigation measure. These systems can help <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-20217-denial-of-service-vulnerability-in-snort-3-detection-engine-of-cisco-secure-firewall-threat-defense-software\/\"  data-wpil-monitor-id=\"76938\">detect and block attempts to exploit this vulnerability<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview CVE-2024-45347 is a critical cybersecurity vulnerability that affects the Xiaomi Mi Connect Service APP. This vulnerability allows unauthorized access to the victim&#8217;s device, potentially leading to a system compromise or data leakage. It is a significant threat due to the wide usage of Xiaomi devices globally, and the fact that the flaw lies in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-55561","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/55561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=55561"}],"version-history":[{"count":11,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/55561\/revisions"}],"predecessor-version":[{"id":69345,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/55561\/revisions\/69345"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=55561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=55561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=55561"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=55561"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=55561"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=55561"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=55561"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=55561"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=55561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}