// For flags

CVE-2020-10263

 

Severity Score

6.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered on XIAOMI XIAOAI speaker Pro LX06 1.52.4. Attackers can get root shell by accessing the UART interface and then they can (i) read Wi-Fi SSID or password, (ii) read the dialogue text files between users and XIAOMI XIAOAI speaker Pro LX06, (iii) use Text-To-Speech tools pretend XIAOMI speakers' voice achieve social engineering attacks, (iv) eavesdrop on users and record what XIAOMI XIAOAI speaker Pro LX06 hears, (v) modify system files, (vi) use commands to send any IR code through IR emitter on XIAOMI XIAOAI Speaker Pro LX06, (vii) stop voice assistant service, (viii) enable the XIAOMI XIAOAI Speaker Pro’ SSH or TELNET service as a backdoor, (IX) tamper with the router configuration of the router in the local area networks.

Se detectó un problema en el altavoz XIAOMI XIAOAI Pro LX06 versión 1.52.4. Los atacantes pueden obtener shell root mediante el acceso a la interfaz UART y luego pueden (i) leer el SSID o la contraseña de Wi-Fi, (ii) leer los archivos de texto de diálogo entre los usuarios y el altavoz XIAOMI XIAOAI Pro LX06, (iii) usar herramientas Text-To-Speech que pretenden que la voz de los hablantes de XIAOMI logren ataques de ingeniería social, (iv) escuchar a escondidas a los usuarios y grabar lo que escucha el altavoz XIAOAI Pro LX06 de XIAOMI, (v) modificar los archivos del sistema, (vi) usar comandos para enviar cualquier código IR por medio del emisor IR en XIAOMI XIAOAI Speaker Pro LX06, (vii) detener el servicio del asistente de voz, (viii) habilitar el servicio SSH o TELNET del XIAOMI XIAOAI Speaker Pro como backdoor, (IX) alterar la configuración del enrutador en las redes de área local.

*Credits: N/A
CVSS Scores
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-03-10 CVE Reserved
  • 2020-04-08 CVE Published
  • 2023-08-12 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-306: Missing Authentication for Critical Function
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mi
Search vendor "Mi"
Xiaomi Xiaoai Speaker Pro Lx06 Firmware
Search vendor "Mi" for product "Xiaomi Xiaoai Speaker Pro Lx06 Firmware"
1.52.4
Search vendor "Mi" for product "Xiaomi Xiaoai Speaker Pro Lx06 Firmware" and version "1.52.4"
-
Affected
in Mi
Search vendor "Mi"
Xiaomi Xiaoai Speaker Pro Lx06
Search vendor "Mi" for product "Xiaomi Xiaoai Speaker Pro Lx06"
--
Safe