CVE-2020-14131 (GCVE-0-2020-14131)

Vulnerability from cvelistv5 – Published: 2022-10-11 00:00 – Updated: 2024-08-04 12:39
VLAI?
Summary
The Xiaomi Security Center expresses heartfelt thanks to ADLab of VenusTech ! At the same time, we also welcome more outstanding and professional security experts and security teams to join the Mi Security Center (MiSRC) to jointly ensure the safe access of millions of Xiaomi users worldwide Life.
Severity ?
No CVSS data available.
CWE
  • a lack of identity verification
Assigner
Impacted products
Vendor Product Version
n/a Xiaomi specific devices Affected: Xiaomi specific devices,Affected Version:11,Fixed Version:12
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:39:36.010Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://trust.mi.com/misrc/bulletins/advisory?cveId=153"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Xiaomi specific devices",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Xiaomi specific devices,Affected Version:11,Fixed Version:12"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Xiaomi Security Center expresses heartfelt thanks to ADLab of VenusTech ! At the same time, we also welcome more outstanding and professional security experts and security teams to join the Mi Security Center (MiSRC) to jointly ensure the safe access of millions of Xiaomi users worldwide Life."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "a lack of identity verification",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-10-11T00:00:00",
        "orgId": "b57733aa-7326-4f07-8e09-0be8e0df1909",
        "shortName": "Xiaomi"
      },
      "references": [
        {
          "url": "https://trust.mi.com/misrc/bulletins/advisory?cveId=153"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b57733aa-7326-4f07-8e09-0be8e0df1909",
    "assignerShortName": "Xiaomi",
    "cveId": "CVE-2020-14131",
    "datePublished": "2022-10-11T00:00:00",
    "dateReserved": "2020-06-15T00:00:00",
    "dateUpdated": "2024-08-04T12:39:36.010Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mi:xiaomi:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F9C6762-9C78-47DC-9306-59762DE70629\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The Xiaomi Security Center expresses heartfelt thanks to ADLab of VenusTech ! At the same time, we also welcome more outstanding and professional security experts and security teams to join the Mi Security Center (MiSRC) to jointly ensure the safe access of millions of Xiaomi users worldwide Life.\"}, {\"lang\": \"es\", \"value\": \"El Centro de Seguridad de Xiaomi expresa su m\\u00e1s sincero agradecimiento a ADLab de VenusTech. Al mismo tiempo, tambi\\u00e9n damos la bienvenida a m\\u00e1s expertos en seguridad y equipos de seguridad excepcionales y profesionales para unirse al Centro de Seguridad Mi (MiSRC) para garantizar conjuntamente el acceso seguro de millones de usuarios de Xiaomi en todo el mundo Vida\"}]",
      "id": "CVE-2020-14131",
      "lastModified": "2024-11-21T05:02:43.700",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}]}",
      "published": "2022-10-11T20:15:10.333",
      "references": "[{\"url\": \"https://trust.mi.com/misrc/bulletins/advisory?cveId=153\", \"source\": \"security@xiaomi.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://trust.mi.com/misrc/bulletins/advisory?cveId=153\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security@xiaomi.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2020-14131\",\"sourceIdentifier\":\"security@xiaomi.com\",\"published\":\"2022-10-11T20:15:10.333\",\"lastModified\":\"2024-11-21T05:02:43.700\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Xiaomi Security Center expresses heartfelt thanks to ADLab of VenusTech ! At the same time, we also welcome more outstanding and professional security experts and security teams to join the Mi Security Center (MiSRC) to jointly ensure the safe access of millions of Xiaomi users worldwide Life.\"},{\"lang\":\"es\",\"value\":\"El Centro de Seguridad de Xiaomi expresa su m\u00e1s sincero agradecimiento a ADLab de VenusTech. Al mismo tiempo, tambi\u00e9n damos la bienvenida a m\u00e1s expertos en seguridad y equipos de seguridad excepcionales y profesionales para unirse al Centro de Seguridad Mi (MiSRC) para garantizar conjuntamente el acceso seguro de millones de usuarios de Xiaomi en todo el mundo Vida\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mi:xiaomi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F9C6762-9C78-47DC-9306-59762DE70629\"}]}]}],\"references\":[{\"url\":\"https://trust.mi.com/misrc/bulletins/advisory?cveId=153\",\"source\":\"security@xiaomi.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://trust.mi.com/misrc/bulletins/advisory?cveId=153\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…