MIUI 9 Global Beta Updated with Fixes for Critical WiFi Vulnerability (KRACK)

MIUI 9 Global Beta Updated with Fixes for Critical WiFi Vulnerability (KRACK)

Just recently Xiaomi announced the rollout for the beta of MIUI 9 on the Xiaomi Redmi Note 4X for Chinese devices. MIUI 9 is Xiaomi’s custom Android skin, placing emphasis on features rather than actual iterative upgrades. However MIUI 9 is based on Android Nougat, and so brings the features from it such as multi window, improved Doze mode and more. More importantly, Xiaomi has included the fix for the KRACK exploit for all devices getting the update.

A huge number of devices can already download MIUI 9, with older devices having features backported to an older version of Android.

The Redmi Note 4 MTK, Redmi Note 4 Qualcomm/Redmi Note 4X, Mi 6, Mi Note, Mi Note 2, Mi 5, Mi 5s, Mi 5s Plus, Mi Max, Mi Max Prime, Mi Max 2, Mi 2/2S, Mi 3, Mi 4, Mi 4i, Redmi 2, Redmi 2 Prime, Redmi 3, Redmi 3S, Redmi Note 4G, Redmi Note Prime, Redmi Note 3 Qualcomm, Redmi Note 3 Special Edition, Redmi Note 2 and Redmi 4 / 4X all have the MIUI 9 download available!

Along with KRACK fixes, other system optimisations have been added, such as a gallery app compression fix and a fingerprint module fix. There are also some home screen bug fixes. These fixes apply to all devices receiving the upgrade, including the now 4 years old Xiaomi Mi 2S. Xiaomi’s dedication to updates is unmatched.

It’s also great to see such a fast release which patches KRACK. Xiaomi is one of the first OEMs to release a fix for the exploit, and for nearly their entire product range too. It’s an achievement, as many OEMs won’t even get to push the fix to more recent devices, let alone ones released four years ago. The Chinese OEM shows yet again why it should be taken seriously when it comes to updates, and the commitment to user security, in this case, is hugely┬árespectable.


MIUI 9 Global Beta Release

Discuss This Story

Want more posts like this delivered to your inbox? Enter your email to be subscribed to our newsletter.

READ THIS NEXT