CVE-2024-13917: CWE-926 Improper Export of Android Application Components in Kruger&Matz com.pri.applock
An application "com.pri.applock", which is pre-loaded on Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data. Exposed ”com.pri.applock.LockUI“ activity allows any other malicious application, with no granted Android system permissions, to inject an arbitrary intent with system-level privileges to a protected application. One must know the protecting PIN number (it might be revealed by exploiting CVE-2024-13916) or ask the user to provide it. Only version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. Application update was released in April 2025.
AI Analysis
Technical Summary
CVE-2024-13917 is a high-severity vulnerability (CVSS 8.3) affecting the Android application component "com.pri.applock.LockUI" within the com.pri.applock app pre-installed on Kruger&Matz smartphones. This app provides functionality to encrypt other applications using a user-defined PIN or biometric data. The vulnerability arises from improper export of the LockUI activity, which is exposed to other applications without requiring any Android system permissions. This allows a malicious app to inject arbitrary intents with system-level privileges into the protected application. However, exploitation requires knowledge of the protecting PIN or biometric authentication, which may be obtained by exploiting a related vulnerability (CVE-2024-13916) or by social engineering the user. The vulnerability was confirmed in version 13 (version code 33) of the app, with an update released in April 2025 to address the issue. The weakness is classified under CWE-926 (Improper Export of Android Application Components), indicating that the app improperly exposes internal components, enabling unauthorized access. The attack vector is local (AV:L), requiring the attacker to have a malicious app installed on the device, but no special permissions or privileges are needed. User interaction is required to trigger the attack, and the vulnerability impacts confidentiality and integrity of protected apps by potentially bypassing encryption protections. No known exploits are currently reported in the wild.
Potential Impact
For European organizations, especially those whose employees or users utilize Kruger&Matz smartphones with the vulnerable com.pri.applock version, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive applications protected by the app lock. Attackers could deploy malicious applications on devices to bypass app encryption protections, potentially exposing corporate data, credentials, or sensitive personal information stored within locked apps. This risk is heightened in environments where BYOD (Bring Your Own Device) policies allow use of such smartphones or where these devices are issued by organizations. The ability to inject intents with system-level privileges could also facilitate lateral movement or privilege escalation within the device, undermining endpoint security. Although exploitation requires knowledge of the PIN or biometric authentication, the possibility of combining this vulnerability with CVE-2024-13916 or social engineering increases the threat. The lack of known exploits in the wild suggests limited current active exploitation, but the high CVSS score and ease of local attack vector warrant proactive mitigation to prevent future incidents.
Mitigation Recommendations
European organizations should ensure that all Kruger&Matz devices are updated to the patched version of com.pri.applock released in April 2025. Device management policies should enforce app updates and restrict installation of untrusted applications to reduce the risk of malicious apps exploiting this vulnerability. Organizations should educate users about the risks of social engineering to protect PIN and biometric data. Implement Mobile Threat Defense (MTD) solutions capable of detecting suspicious app behaviors and intent injections. Where possible, disable or restrict the use of com.pri.applock on corporate devices until patched. Conduct regular security audits and penetration tests on mobile endpoints to identify and remediate similar component exposure issues. Additionally, monitor for any emerging exploits related to this vulnerability or the linked CVE-2024-13916 to respond rapidly. Finally, consider deploying endpoint detection and response (EDR) tools with mobile capabilities to detect anomalous activities indicative of exploitation attempts.
Affected Countries
Poland, Germany, France, Italy, Spain, United Kingdom
CVE-2024-13917: CWE-926 Improper Export of Android Application Components in Kruger&Matz com.pri.applock
Description
An application "com.pri.applock", which is pre-loaded on Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data. Exposed ”com.pri.applock.LockUI“ activity allows any other malicious application, with no granted Android system permissions, to inject an arbitrary intent with system-level privileges to a protected application. One must know the protecting PIN number (it might be revealed by exploiting CVE-2024-13916) or ask the user to provide it. Only version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. Application update was released in April 2025.
AI-Powered Analysis
Technical Analysis
CVE-2024-13917 is a high-severity vulnerability (CVSS 8.3) affecting the Android application component "com.pri.applock.LockUI" within the com.pri.applock app pre-installed on Kruger&Matz smartphones. This app provides functionality to encrypt other applications using a user-defined PIN or biometric data. The vulnerability arises from improper export of the LockUI activity, which is exposed to other applications without requiring any Android system permissions. This allows a malicious app to inject arbitrary intents with system-level privileges into the protected application. However, exploitation requires knowledge of the protecting PIN or biometric authentication, which may be obtained by exploiting a related vulnerability (CVE-2024-13916) or by social engineering the user. The vulnerability was confirmed in version 13 (version code 33) of the app, with an update released in April 2025 to address the issue. The weakness is classified under CWE-926 (Improper Export of Android Application Components), indicating that the app improperly exposes internal components, enabling unauthorized access. The attack vector is local (AV:L), requiring the attacker to have a malicious app installed on the device, but no special permissions or privileges are needed. User interaction is required to trigger the attack, and the vulnerability impacts confidentiality and integrity of protected apps by potentially bypassing encryption protections. No known exploits are currently reported in the wild.
Potential Impact
For European organizations, especially those whose employees or users utilize Kruger&Matz smartphones with the vulnerable com.pri.applock version, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive applications protected by the app lock. Attackers could deploy malicious applications on devices to bypass app encryption protections, potentially exposing corporate data, credentials, or sensitive personal information stored within locked apps. This risk is heightened in environments where BYOD (Bring Your Own Device) policies allow use of such smartphones or where these devices are issued by organizations. The ability to inject intents with system-level privileges could also facilitate lateral movement or privilege escalation within the device, undermining endpoint security. Although exploitation requires knowledge of the PIN or biometric authentication, the possibility of combining this vulnerability with CVE-2024-13916 or social engineering increases the threat. The lack of known exploits in the wild suggests limited current active exploitation, but the high CVSS score and ease of local attack vector warrant proactive mitigation to prevent future incidents.
Mitigation Recommendations
European organizations should ensure that all Kruger&Matz devices are updated to the patched version of com.pri.applock released in April 2025. Device management policies should enforce app updates and restrict installation of untrusted applications to reduce the risk of malicious apps exploiting this vulnerability. Organizations should educate users about the risks of social engineering to protect PIN and biometric data. Implement Mobile Threat Defense (MTD) solutions capable of detecting suspicious app behaviors and intent injections. Where possible, disable or restrict the use of com.pri.applock on corporate devices until patched. Conduct regular security audits and penetration tests on mobile endpoints to identify and remediate similar component exposure issues. Additionally, monitor for any emerging exploits related to this vulnerability or the linked CVE-2024-13916 to respond rapidly. Finally, consider deploying endpoint detection and response (EDR) tools with mobile capabilities to detect anomalous activities indicative of exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-03-04T13:18:36.774Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6839ce93182aa0cae2b5b188
Added to database: 5/30/2025, 3:28:19 PM
Last enriched: 7/8/2025, 4:12:15 PM
Last updated: 8/11/2025, 12:59:46 PM
Views: 24
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.