Want to get paid for a vulnerability similar to this one?
Contact us at: email@example.com
The following advisory describes an Firmware Update Process Vulnerability found in Xiaomi Air Purifier 2.
Mi Air Purifier is a High performance smart air purifier (IoT) that can be controlled remotely.
According to the manufacture (Xiaomi) “Monitor your home air quality in real time from absolutely anywhere when you sync with the Mi Home app on your phone. Control Mi Air Purifier remotely and watch how air is being purified. The app even displays outside air quality and tells you when it’s safe to switch Mi off and open your windows.”
Xiaomi Air Purifier 2, version 1.2.4_59, does not use a secure connection for its firmware update process. The update process is in plain-text HTTP.
A potential attacker can exploit the firmware update process to:
- Obtaining the firmware binary for analysis to conduct other attacks
- Enables inject modified firmware
An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program.
We reported the vulnerability to Xiaomi and they informed us that: “Because of Xiaomi Air Purifier initial design features,there is not enough storage is available to use HTTPS. So this will not be fixed for the time being but it will be fixed in the later versions.”