Home

Description

An application "com.pri.applock", which is pre-loaded on Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data. Exposed ”com.android.providers.settings.fingerprint.PriFpShareProvider“ content provider's public method query() allows any other malicious application, without any granted Android system permissions, to exfiltrate the PIN code. Only version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. Application update was released in April 2025.

PUBLISHED Reserved 2025-03-04 | Published 2025-05-30 | Updated 2025-10-03 | Assigner CERT-PL




MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-926 Improper Export of Android Application Components

Product status

Default status
unaffected

13
affected

Credits

Szymon Chadam finder

References

cert.pl/en/posts/2025/05/CVE-2024-13915 third-party-advisory

cve.org (CVE-2024-13916)

nvd.nist.gov (CVE-2024-13916)

Download JSON