Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mi:xiaomi_xiaoai_speaker_pro_lx06_firmware:1.58.10:*:*:*:*:*:*:*", "matchCriteriaId": "00E66AE0-AB23-4700-8D05-B7955ED65D94", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mi:xiaomi_xiaoai_speaker_pro_lx06:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFA1011F-2FE2-49E2-9A7E-AEB18C735BB8", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "An issue was discovered on XIAOMI XIAOAI speaker Pro LX06 1.58.10. Attackers can activate the failsafe mode during the boot process, and use the mi_console command cascaded by the SN code shown on the product to get the root shell password, and then the attacker can (i) read Wi-Fi SSID or password, (ii) read the dialogue text files between users and XIAOMI XIAOAI speaker Pro LX06, (iii) use Text-To-Speech tools pretend XIAOMI speakers' voice achieve social engineering attacks, (iv) eavesdrop on users and record what XIAOMI XIAOAI speaker Pro LX06 hears, (v) modify system files, (vi) use commands to send any IR code through IR emitter on XIAOMI XIAOAI Speaker Pro (LX06), (vii) stop voice assistant service, (viii) enable the XIAOMI XIAOAI Speaker Pro\u2019s SSH or TELNET service as a backdoor, (IX) tamper with the router configuration of the router in the local area networks."}, {"lang": "es", "value": "Se detect\u00f3 un problema en el altavoz XIAOMI XIAOAI Pro LX06 versi\u00f3n 1.58.10. Los atacantes pueden activar el modo a prueba de fallos durante el proceso de arranque y usar el comando mi_console en cascada por el c\u00f3digo SN que se muestra en el producto para obtener la contrase\u00f1a del shell root, y luego el atacante puede (i) leer el SSID o la contrase\u00f1a de Wi-Fi, (ii ) leer los archivos de texto de di\u00e1logo entre los usuarios y el altavoz XIAOMI XIAOAI Pro LX06, (iii) usar herramientas Text-To-Speech que pretenden que la voz de los altavoces XIAOMI logren ataques de ingenier\u00eda social, (iv) escuchar a escondidas a los usuarios y grabar lo que escucha el altavoz XIAOMI XIAOAI Pro LX06 , (v) modificar los archivos del sistema, (vi) usar comandos para enviar cualquier c\u00f3digo IR por medio del emisor IR en XIAOMI XIAOAI Speaker Pro (LX06), (vii) detener el servicio del asistente de voz, (viii) habilitar el servicio SSH o TELNET del XIAOMI XIAOAI Speaker Pro como backdoor, (IX) alterar la configuraci\u00f3n del enrutador en las redes de \u00e1rea local."}], "id": "CVE-2020-10262", "lastModified": "2024-11-21T04:55:05.260", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-04-08T18:15:15.197", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-10262.md"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://sec.xiaomi.com"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.youtube.com/watch?v=Cr5DupGxmL4"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2020-10262.md"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://sec.xiaomi.com"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.youtube.com/watch?v=Cr5DupGxmL4"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}