Security News Xiaomi Mi4 Devices Might Be Exposed Due to Improper Update Procedure

Solarquest

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 22, 2014
2,525
Attackers can hijack Xiaomi Mi4 devices, and possibly Redmi handsets, due of the improper way Xiaomi handles updates procedures for a built-in app called AnalyticsCore.

All OEMs pack a suite of bloatware apps with their devices. One of the apps that Xiaomi includes with its bastard Android version is the AnalyticsCore, which by its name, is obviously a package for collecting data about device usage.

Dutch security researcher Thijs Broenink, who blogged about this issue two days ago, says the app contains code that checks for a new version every 24 hours.

Attackers could replace the update package with their own APK
If the app finds a new version on the Xiaomi home servers, it will download this version and run it on the user's device under a user/app with high privileges.

Broenink says the app doesn't check the validity or source of the downloaded APK, which opens the door for possible on-device attacks.

Malware present on the user's phone could watch when this file is downloaded, or place it in a special app folder and have it installed by the automatic update procedure.

"It seems like there indeed is no validation on what APK is getting installed. So it looks like Xiaomi can replace any (signed?) package they want silently on your device within 24 hours," the researcher also suggested. Is this a backdoor too your Xiaomi device? Probably not. But it shouldn't be there either.

On-device and MitM attacks are both possible
Furthermore, the AnalyticsCore app downloads updates from an HTTP URL, exposing itself and its users to Man-in-the-Middle attacks.

"One can intercept the [download] request on a public hotspot and deliver a modified APK file," Broenink said in a Twitter conversation. "But yes, a MitM seems like a plausible scenario."

In his blog, the Dutch researcher recommends that users block any network requests from the phone to the xiaomi.com domain, just to be safe.

Broenink has not filed a bug report with Xiaomi about his discovery. Softpedia has reached out to Xiaomi to inform the company about the researcher's findings and for additional comment on this issue.


It's bloatware, collects data and it's unsafe.....
 
Y

yigido

If you are using Chinese based products, you have to accept their backdoors..
Do not buy these!
 
Y

yigido

definitely, We can only accept NSA backdoors.
No sir, if you want to accept them all OK. There is no difference between them..
but Chinese softwares products are famous with backdoors! Sorry..
 

Evjl's Rain

Level 47
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Apr 18, 2016
3,684
consider its price, it can be acceptable as people buying mi4 mostly dont care/know about security

in my country, mi4 fullbox costs ~$125. cant bedenied due to price-over-specs
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Not surprise, bundlewares makes the phone or such product worst at all. There's a valid argument where Chinese brands have to do the tactics.

It is like you put some unnecessary makeup/foundation on your face. ;)

Luckily my phone (Firefly Mobile) Hong Kong brand does not contain any bloatware, like an Android One phone already. ;)
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top