Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36063: n/a

0
High
VulnerabilityCVE-2024-36063cvecve-2024-36063
Published: Thu Nov 07 2024 (11/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-36063 is a high-severity vulnerability in the Goodwy Right Dialer Android application (up to version 5. 1. 0) that allows any app without permissions to place phone calls silently by sending a crafted intent to the DialerActivity component. This flaw requires no user interaction or privileges, enabling unauthorized call initiation which can lead to financial fraud or privacy violations. The vulnerability stems from improper access control (CWE-276) on the exposed component. Although no known exploits are reported yet, the ease of exploitation and potential impact on call integrity make this a significant risk. Organizations using devices with this dialer app should prioritize mitigation to prevent abuse. No patch links are currently available, so alternative controls are necessary. Countries with high Android usage and significant deployment of this app are most at risk. The CVSS score is 7.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:58:35 UTC

Technical Analysis

CVE-2024-36063 identifies a critical vulnerability in the Goodwy com.goodwy.dialer (Right Dialer) Android application, specifically affecting versions through 5.1.0. The vulnerability allows any installed application, even those without any declared permissions, to initiate phone calls without user consent or interaction. This is achieved by sending a specially crafted intent to the exposed component com.goodwy.dialer.activities.DialerActivity. The root cause is improper access control on this component, classified under CWE-276 (Incorrect Default Permissions). Because the component is exported and does not enforce permission checks, malicious apps can exploit this to place calls silently, potentially leading to unauthorized charges, privacy breaches, or social engineering attacks. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity due to its network attack vector, lack of required privileges, no user interaction, and high impact on integrity (unauthorized call placement). No patches or official fixes have been published yet, and no exploits are currently known in the wild. This vulnerability highlights the risks of exposed Android components without proper permission enforcement, especially in telephony-related apps.

Potential Impact

The primary impact of CVE-2024-36063 is unauthorized call initiation by malicious apps without user knowledge or consent. This can lead to significant financial losses for users or organizations due to fraudulent calls to premium-rate numbers or toll services. Privacy is also compromised as calls could be placed to contacts or services without user approval, potentially exposing sensitive information or enabling further social engineering attacks. For organizations, compromised devices could be leveraged as part of larger fraud schemes or to disrupt communications. The lack of required permissions and user interaction lowers the barrier for exploitation, increasing the risk of widespread abuse. Although availability and confidentiality impacts are minimal, the integrity of telephony functions is severely affected. The absence of patches means affected users remain vulnerable until mitigations or updates are applied.

Mitigation Recommendations

Since no official patches are currently available, organizations and users should implement the following mitigations: 1) Restrict installation of untrusted or unknown applications to reduce the risk of malicious apps exploiting this vulnerability. 2) Use mobile device management (MDM) solutions to monitor and control app permissions and behavior, including blocking apps that attempt to send intents to the vulnerable component. 3) Disable or uninstall the Goodwy Right Dialer app if it is not essential or replace it with a trusted dialer application that enforces proper permission checks. 4) Employ runtime application behavior monitoring tools that can detect unauthorized call attempts and alert users or administrators. 5) Educate users about the risks of installing apps from unofficial sources and encourage vigilance regarding unexpected phone calls or charges. 6) Monitor telephony usage logs for unusual call patterns indicative of exploitation. 7) Stay alert for vendor updates or patches and apply them promptly once available. These steps go beyond generic advice by focusing on controlling app behavior and reducing exposure until a fix is released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c5bb7ef31ef0b56348b

Added to database: 2/25/2026, 9:40:43 PM

Last enriched: 2/26/2026, 4:58:35 AM

Last updated: 2/26/2026, 7:39:34 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats