{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T09:05:11.510","vulnerabilities":[{"cve":{"id":"CVE-2020-9531","sourceIdentifier":"cve@mitre.org","published":"2020-03-06T17:15:12.587","lastModified":"2024-11-21T05:40:49.077","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An issue was discovered on Xiaomi MIUI V11.0.5.0.QFAEUXM devices. In the Web resources of GetApps(com.xiaomi.mipicks), the parameters passed in are read and executed. After reading the resource files, relevant components open the link of the incoming URL. Although the URL is safe and can pass security detection, the data carried in the parameters are loaded and executed. An attacker can use NFC tools to get close enough to a user's unlocked phone to cause apps to be installed and information to be leaked. This is fixed on version: 2001122."},{"lang":"es","value":"Se detectó un problema en los dispositivos Xiaomi MIUI versión  V11.0.5.0.QFAEUXM. En los recursos web de GetApps(com.xiaomi.mipicks), los parámetros pasados son leídos y ejecutados. Después de leer los archivos de recursos, los componentes relevantes abren el enlace de la URL entrante. Aunque la URL es segura y puede pasar la detección de seguridad, los datos llevados en los parámetros son cargados y ejecutados. Un atacante puede usar herramientas NFC para acercarse lo suficiente al teléfono desbloqueado de un usuario para causar que aplicaciones sean instaladas y la información sea filtrada. Esto es corregido en la versión: 2001122."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:M/Au:N/C:P/I:P/A:N","baseScore":4.3,"accessVector":"ADJACENT_NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":5.5,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mi:miui_firmware:11.0.5.0.qfaeuxm:*:*:*:*:*:*:*","matchCriteriaId":"63CFF65D-314B-4414-ADAC-72B10C9E3741"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mi:miui:-:*:*:*:*:*:*:*","matchCriteriaId":"B5257A4A-A2BF-415B-A8D6-16DBBED9880C"}]}]}],"references":[{"url":"https://sec.xiaomi.com/post/180","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-20-287/","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-20-288/","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://sec.xiaomi.com/post/180","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-20-287/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-20-288/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}}]}