We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-13917

Intent Injection in Kruger&Matz AppLock application



Description

An application "com.pri.applock", which is pre-loaded on Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data. Exposed ”com.pri.applock.LockUI“ activity allows any other malicious application, with no granted Android system permissions, to inject an arbitrary intent with system-level privileges to a protected application. One must know the protecting PIN number (it might be revealed by exploiting CVE-2024-13916) or ask the user to provide it. Vendor did not provide information about vulnerable versions. Only version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability

Reserved 2025-03-04 | Published 2025-05-30 | Updated 2025-05-30 | Assigner CERT-PL


HIGH: 8.3CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-926 Improper Export of Android Application Components

Product status

Default status
unaffected

13
affected

Credits

Szymon Chadam finder

References

cert.pl/en/posts/2025/05/CVE-2024-13915 third-party-advisory

cve.org (CVE-2024-13917)

nvd.nist.gov (CVE-2024-13917)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-13917

Support options

Helpdesk Chat, Email, Knowledgebase