CVE-2026-26214 Overview
CVE-2026-26214 is a critical TLS hostname verification bypass vulnerability in the Galaxy FDS Android SDK (XiaoMi/galaxy-fds-sdk-android) version 3.0.8 and prior. The SDK disables TLS hostname verification when HTTPS is enabled, which is the default configuration. This implementation flaw allows man-in-the-middle attackers to intercept and modify communications between Android applications and Xiaomi FDS cloud storage endpoints.
Critical Impact
Applications using the Galaxy FDS Android SDK with default HTTPS settings are vulnerable to man-in-the-middle attacks, potentially exposing authentication credentials, file contents, and API responses to attackers who can intercept network traffic.
Affected Products
- Galaxy FDS Android SDK (XiaoMi/galaxy-fds-sdk-android) version 3.0.8
- Galaxy FDS Android SDK (XiaoMi/galaxy-fds-sdk-android) all versions prior to 3.0.8
- Android applications integrating the affected SDK versions with default HTTPS configuration
Discovery Timeline
- 2026-02-12 - CVE-2026-26214 published to NVD
- 2026-02-12 - Last updated in NVD database
Technical Details for CVE-2026-26214
Vulnerability Analysis
This vulnerability stems from improper certificate validation (CWE-297) in the Galaxy FDS Android SDK. The core issue exists in the GalaxyFDSClientImpl.createHttpClient() method, where the SDK configures Apache HttpClient with SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER. This configuration accepts any valid TLS certificate regardless of whether the hostname matches, effectively nullifying a critical security control in the TLS handshake process.
Since HTTPS is enabled by default in FDSClientConfiguration, all applications using the SDK with default settings are affected without any explicit developer action. The XiaoMi/galaxy-fds-sdk-android open source project has reached end-of-life status, meaning no official patches will be released.
Root Cause
The root cause is the use of SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER in the HTTP client configuration. Hostname verification is a critical component of TLS security that ensures the certificate presented by the server matches the hostname being connected to. By allowing all hostnames to pass verification, the SDK accepts certificates that belong to entirely different domains, enabling attackers with any valid certificate to impersonate Xiaomi FDS cloud storage servers.
This is a common anti-pattern seen in Android development, often introduced during development for testing purposes against self-signed certificates but mistakenly left in production code.
Attack Vector
The attack requires network-level access to intercept traffic between the vulnerable application and Xiaomi FDS cloud endpoints. An attacker positioned as a man-in-the-middle (such as on a compromised Wi-Fi network, through ARP spoofing, or via DNS hijacking) can present their own valid TLS certificate to the client application.
Since hostname verification is disabled, the SDK accepts the attacker's certificate even though it doesn't match the legitimate FDS endpoint hostname. The attacker can then decrypt, inspect, and modify all traffic between the application and the cloud storage service. This includes authentication credentials, uploaded or downloaded file contents, and API responses that could be manipulated to alter application behavior.
Detection Methods for CVE-2026-26214
Indicators of Compromise
- Unexpected network connections from Android applications to IP addresses not belonging to Xiaomi FDS infrastructure
- Certificate warnings or errors in network monitoring tools indicating hostname mismatches for FDS-related traffic
- Anomalous data patterns or unexpected modifications in files retrieved from FDS cloud storage
- Authentication failures or unexpected session invalidations that may indicate credential theft
Detection Strategies
- Perform static analysis of Android application dependencies to identify usage of galaxy-fds-sdk-android version 3.0.8 or earlier
- Monitor network traffic for TLS connections to FDS endpoints that show certificate chain anomalies
- Implement certificate transparency log monitoring to detect unauthorized certificates being issued for Xiaomi domains
- Review application source code for direct usage of ALLOW_ALL_HOSTNAME_VERIFIER or similar insecure hostname verification configurations
Monitoring Recommendations
- Deploy network intrusion detection systems configured to alert on suspicious TLS handshake patterns for cloud storage endpoints
- Implement application-level logging to track all SDK communications with FDS endpoints including certificate details
- Establish baseline network behavior for applications using the FDS SDK to identify deviation patterns
- Monitor for any signs of data exfiltration or unusual data access patterns from cloud storage
How to Mitigate CVE-2026-26214
Immediate Actions Required
- Identify all applications in your environment using the Galaxy FDS Android SDK version 3.0.8 or earlier
- Assess the criticality and data sensitivity of affected applications to prioritize remediation efforts
- Consider temporarily restricting network access for highly sensitive applications until remediation is complete
- Implement network-level protections such as VPN or TLS inspection where feasible
Patch Information
The XiaoMi/galaxy-fds-sdk-android open source project has reached end-of-life status, and no official patch is available. Organizations must implement alternative mitigations or migrate to supported solutions. For more information, refer to the GitHub Repository for Galaxy FDS SDK and the VulnCheck Advisory on Xiaomi SDK.
Workarounds
- Fork the SDK repository and modify GalaxyFDSClientImpl.createHttpClient() to use proper hostname verification instead of ALLOW_ALL_HOSTNAME_VERIFIER
- Migrate to an actively maintained alternative SDK or implement direct API integration with proper TLS configuration
- Implement certificate pinning at the application level to restrict connections to known legitimate certificates
- Use network segmentation to isolate applications using the vulnerable SDK from untrusted network segments
# Example: Checking Android project dependencies for vulnerable SDK
# Search for galaxy-fds-sdk-android in Gradle dependencies
grep -r "galaxy-fds-sdk-android" build.gradle*
grep -r "com.xiaomi" build.gradle*
# Check for vulnerable version in dependency tree
./gradlew dependencies | grep -i "galaxy-fds"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

