CVE-2026-26214: CWE-297 Improper Validation of Certificate with Host Mismatch in Xiaomi Technology Co., Ltd. Galaxy FDS Android SDK
Galaxy FDS Android SDK (XiaoMi/galaxy-fds-sdk-android) version 3.0.8 and prior disable TLS hostname verification when HTTPS is enabled (the default configuration). In GalaxyFDSClientImpl.createHttpClient(), the SDK configures Apache HttpClient with SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER, which accepts any valid TLS certificate regardless of hostname mismatch. Because HTTPS is enabled by default in FDSClientConfiguration, all applications using the SDK with default settings are affected. This vulnerability allows a man-in-the-middle attacker to intercept and modify SDK communications to Xiaomi FDS cloud storage endpoints, potentially exposing authentication credentials, file contents, and API responses. The XiaoMi/galaxy-fds-sdk-android open source project has reached end-of-life status.
AI Analysis
Technical Summary
The Galaxy FDS Android SDK by Xiaomi, up to version 3.0.8, contains a severe security vulnerability identified as CVE-2026-26214, classified under CWE-297 (Improper Validation of Certificate with Host Mismatch). The root cause is the SDK's default configuration of the Apache HttpClient to use SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER, which disables hostname verification during TLS handshake. This means that while the TLS certificate itself is validated, the hostname presented by the server is not checked against the certificate's subject or SAN fields. Consequently, an attacker capable of performing a man-in-the-middle (MitM) attack can present a valid TLS certificate for any hostname, intercepting and potentially modifying all HTTPS traffic between the client application and Xiaomi's FDS cloud storage endpoints. Since HTTPS is enabled by default in the SDK's FDSClientConfiguration, all applications using the SDK without custom configuration are vulnerable. The vulnerability allows attackers to capture sensitive data such as authentication tokens, file contents, and API responses, compromising confidentiality and integrity. The SDK is open source but has reached end-of-life, meaning no official patches or updates will be provided. The CVSS 4.0 vector indicates network attack vector, high attack complexity, no privileges or user interaction required, and high impact on confidentiality and integrity, confirming the critical nature of this flaw. No known exploits are currently reported in the wild, but the ease of exploitation and impact make it a significant threat.
Potential Impact
For European organizations, this vulnerability poses a critical risk especially for those developing or deploying Android applications that integrate Xiaomi's Galaxy FDS SDK for cloud storage functionalities. The potential interception and manipulation of data can lead to unauthorized disclosure of sensitive information, including user credentials and proprietary files, resulting in data breaches and loss of trust. Integrity of data stored or retrieved via the SDK can be compromised, potentially affecting business operations and compliance with data protection regulations such as GDPR. The lack of hostname verification undermines the fundamental security guarantees of TLS, exposing organizations to espionage, data tampering, and further lateral attacks within their networks. Given the SDK's end-of-life status, organizations cannot rely on vendor patches, increasing the urgency to remediate or replace the SDK. This threat is particularly impactful for sectors handling sensitive personal or corporate data, including finance, healthcare, and government services within Europe.
Mitigation Recommendations
1. Immediate audit of all Android applications to identify usage of the Galaxy FDS Android SDK, especially versions 3.0.8 and earlier. 2. Remove or replace the vulnerable SDK with a secure alternative that properly validates TLS hostnames. 3. If removal is not immediately feasible, implement custom hostname verification logic in the application to override the default insecure behavior. 4. Employ network-level protections such as enforcing TLS interception detection, using VPNs, or network segmentation to reduce the risk of MitM attacks. 5. Monitor network traffic for unusual patterns indicative of interception or tampering. 6. Educate development teams about secure TLS practices and the risks of disabling hostname verification. 7. For applications already deployed, consider issuing updates or patches that address the vulnerability or disable the affected SDK features. 8. Engage in threat intelligence sharing within industry groups to stay informed about any emerging exploits targeting this vulnerability. 9. Review and strengthen overall mobile application security policies to prevent similar issues in third-party SDKs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2026-26214: CWE-297 Improper Validation of Certificate with Host Mismatch in Xiaomi Technology Co., Ltd. Galaxy FDS Android SDK
Description
Galaxy FDS Android SDK (XiaoMi/galaxy-fds-sdk-android) version 3.0.8 and prior disable TLS hostname verification when HTTPS is enabled (the default configuration). In GalaxyFDSClientImpl.createHttpClient(), the SDK configures Apache HttpClient with SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER, which accepts any valid TLS certificate regardless of hostname mismatch. Because HTTPS is enabled by default in FDSClientConfiguration, all applications using the SDK with default settings are affected. This vulnerability allows a man-in-the-middle attacker to intercept and modify SDK communications to Xiaomi FDS cloud storage endpoints, potentially exposing authentication credentials, file contents, and API responses. The XiaoMi/galaxy-fds-sdk-android open source project has reached end-of-life status.
AI-Powered Analysis
Technical Analysis
The Galaxy FDS Android SDK by Xiaomi, up to version 3.0.8, contains a severe security vulnerability identified as CVE-2026-26214, classified under CWE-297 (Improper Validation of Certificate with Host Mismatch). The root cause is the SDK's default configuration of the Apache HttpClient to use SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER, which disables hostname verification during TLS handshake. This means that while the TLS certificate itself is validated, the hostname presented by the server is not checked against the certificate's subject or SAN fields. Consequently, an attacker capable of performing a man-in-the-middle (MitM) attack can present a valid TLS certificate for any hostname, intercepting and potentially modifying all HTTPS traffic between the client application and Xiaomi's FDS cloud storage endpoints. Since HTTPS is enabled by default in the SDK's FDSClientConfiguration, all applications using the SDK without custom configuration are vulnerable. The vulnerability allows attackers to capture sensitive data such as authentication tokens, file contents, and API responses, compromising confidentiality and integrity. The SDK is open source but has reached end-of-life, meaning no official patches or updates will be provided. The CVSS 4.0 vector indicates network attack vector, high attack complexity, no privileges or user interaction required, and high impact on confidentiality and integrity, confirming the critical nature of this flaw. No known exploits are currently reported in the wild, but the ease of exploitation and impact make it a significant threat.
Potential Impact
For European organizations, this vulnerability poses a critical risk especially for those developing or deploying Android applications that integrate Xiaomi's Galaxy FDS SDK for cloud storage functionalities. The potential interception and manipulation of data can lead to unauthorized disclosure of sensitive information, including user credentials and proprietary files, resulting in data breaches and loss of trust. Integrity of data stored or retrieved via the SDK can be compromised, potentially affecting business operations and compliance with data protection regulations such as GDPR. The lack of hostname verification undermines the fundamental security guarantees of TLS, exposing organizations to espionage, data tampering, and further lateral attacks within their networks. Given the SDK's end-of-life status, organizations cannot rely on vendor patches, increasing the urgency to remediate or replace the SDK. This threat is particularly impactful for sectors handling sensitive personal or corporate data, including finance, healthcare, and government services within Europe.
Mitigation Recommendations
1. Immediate audit of all Android applications to identify usage of the Galaxy FDS Android SDK, especially versions 3.0.8 and earlier. 2. Remove or replace the vulnerable SDK with a secure alternative that properly validates TLS hostnames. 3. If removal is not immediately feasible, implement custom hostname verification logic in the application to override the default insecure behavior. 4. Employ network-level protections such as enforcing TLS interception detection, using VPNs, or network segmentation to reduce the risk of MitM attacks. 5. Monitor network traffic for unusual patterns indicative of interception or tampering. 6. Educate development teams about secure TLS practices and the risks of disabling hostname verification. 7. For applications already deployed, consider issuing updates or patches that address the vulnerability or disable the affected SDK features. 8. Engage in threat intelligence sharing within industry groups to stay informed about any emerging exploits targeting this vulnerability. 9. Review and strengthen overall mobile application security policies to prevent similar issues in third-party SDKs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-02-11T20:08:07.943Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698df2f6c9e1ff5ad8e60c1f
Added to database: 2/12/2026, 3:34:14 PM
Last enriched: 2/12/2026, 3:48:33 PM
Last updated: 2/12/2026, 5:06:39 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61879: n/a
UnknownCVE-2025-54756: CWE-1392 in BrightSign BrightSign OS series 4 players
HighCVE-2025-61880: n/a
CriticalCVE-2025-55210: CWE-270: Privilege Context Switching Error in FreePBX api
LowCVE-2025-69752: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.