Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26214: CWE-297 Improper Validation of Certificate with Host Mismatch in Xiaomi Technology Co., Ltd. Galaxy FDS Android SDK

0
Critical
VulnerabilityCVE-2026-26214cvecve-2026-26214cwe-297
Published: Thu Feb 12 2026 (02/12/2026, 15:01:15 UTC)
Source: CVE Database V5
Vendor/Project: Xiaomi Technology Co., Ltd.
Product: Galaxy FDS Android SDK

Description

Galaxy FDS Android SDK (XiaoMi/galaxy-fds-sdk-android) version 3.0.8 and prior disable TLS hostname verification when HTTPS is enabled (the default configuration). In GalaxyFDSClientImpl.createHttpClient(), the SDK configures Apache HttpClient with SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER, which accepts any valid TLS certificate regardless of hostname mismatch. Because HTTPS is enabled by default in FDSClientConfiguration, all applications using the SDK with default settings are affected. This vulnerability allows a man-in-the-middle attacker to intercept and modify SDK communications to Xiaomi FDS cloud storage endpoints, potentially exposing authentication credentials, file contents, and API responses. The XiaoMi/galaxy-fds-sdk-android open source project has reached end-of-life status.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 21:11:30 UTC

Technical Analysis

The vulnerability CVE-2026-26214 affects the Galaxy FDS Android SDK developed by Xiaomi Technology Co., Ltd., specifically versions 3.0.8 and earlier. The core issue is improper validation of TLS certificates due to disabled hostname verification when HTTPS is enabled, which is the default setting. In the SDK's implementation, the Apache HttpClient is configured with SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER, a permissive verifier that accepts any valid TLS certificate regardless of whether the certificate's hostname matches the intended server hostname. This misconfiguration violates the fundamental security principle of hostname verification in TLS, allowing man-in-the-middle (MITM) attackers to intercept and manipulate encrypted communications between client applications and Xiaomi's FDS cloud storage endpoints. As a result, attackers can potentially access sensitive data such as authentication tokens, file contents, and API responses. The SDK has reached end-of-life status, meaning no official patches or updates will be provided to address this vulnerability. The CVSS 4.0 base score of 9.1 reflects the critical nature of this flaw, with network attack vector, no privileges or user interaction required, and high impact on confidentiality and integrity. The vulnerability does not require authentication or user interaction, increasing its risk. This issue affects all applications using the SDK with default HTTPS settings, making it widespread among affected Android apps. The lack of patch availability necessitates alternative mitigation strategies.

Potential Impact

The impact of CVE-2026-26214 is severe for organizations using the Galaxy FDS Android SDK in their mobile applications. Because the vulnerability allows MITM attackers to intercept and modify encrypted traffic, sensitive information such as authentication credentials, user data, and cloud storage contents can be exposed or altered. This compromises confidentiality and integrity, potentially leading to unauthorized data access, data leakage, and manipulation of API responses. For enterprises relying on Xiaomi's cloud storage services via this SDK, this could result in data breaches, loss of customer trust, regulatory non-compliance, and financial damage. The vulnerability's ease of exploitation—requiring no authentication or user interaction—and its presence in default configurations increase the likelihood of exploitation in the wild. The end-of-life status of the SDK further exacerbates the risk, as no official fixes are forthcoming, forcing organizations to consider migration or custom security controls. Overall, this vulnerability poses a critical threat to the security posture of affected Android applications and their users worldwide.

Mitigation Recommendations

Given the end-of-life status of the Galaxy FDS Android SDK and the absence of official patches, organizations must adopt immediate and specific mitigation measures: 1) Discontinue use of the vulnerable SDK version and migrate to alternative, actively maintained cloud storage SDKs that enforce proper TLS hostname verification. 2) If migration is not immediately feasible, implement custom hostname verification logic within the application to override the default permissive verifier and enforce strict hostname checks against expected server names. 3) Employ network-level protections such as TLS interception detection, certificate pinning, or VPNs to reduce MITM risks. 4) Conduct thorough code audits to identify all instances of the SDK usage and ensure no legacy versions remain in production. 5) Educate developers about the risks of disabling hostname verification and enforce secure coding standards for TLS usage. 6) Monitor network traffic for anomalies indicative of MITM attacks targeting affected applications. 7) Engage with Xiaomi or community forums for any unofficial patches or forks that address this vulnerability. These targeted actions go beyond generic advice and address the unique challenges posed by an unpatched, end-of-life SDK.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-11T20:08:07.943Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698df2f6c9e1ff5ad8e60c1f

Added to database: 2/12/2026, 3:34:14 PM

Last enriched: 3/7/2026, 9:11:30 PM

Last updated: 3/29/2026, 11:22:56 PM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses