An application "com.pri.applock", which is pre-loaded on Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.
Exposed ”com.pri.applock.LockUI“ activity allows any other malicious application, with no granted Android system permissions, to inject an arbitrary intent with system-level privileges to a protected application. One must know the protecting PIN number (it might be revealed by exploiting CVE-2024-13916) or ask the user to provide it.
Vendor did not provide information about vulnerable versions.
Only version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://cert.pl/en/posts/2025/05/CVE-2024-13915 |
Configurations
No configuration.
History
30 May 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-30 16:15
Updated : 2025-05-30 16:31
NVD link : CVE-2024-13917
Mitre link : CVE-2024-13917
CVE.ORG link : CVE-2024-13917
JSON object : View
Products Affected
No product.
CWE
CWE-926
Improper Export of Android Application Components