CVE-2024-36064: n/a
The NLL com.nll.cb (aka ACR Phone) application through 0.330-playStore-NoAccessibility-arm8 for Android allows any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.nll.cb.dialer.dialer.DialerActivity component.
AI Analysis
Technical Summary
CVE-2024-36064 is a vulnerability identified in the NLL com.nll.cb (also known as ACR Phone) Android application, specifically in versions up to 0.330-playStore-NoAccessibility-arm8. The flaw allows any installed application on the device, even those without any granted permissions, to initiate phone calls without any user interaction. This is achieved by sending a crafted intent to the vulnerable component com.nll.cb.dialer.dialer.DialerActivity, which lacks proper access control or intent validation. The vulnerability stems from improper intent filtering and insufficient validation, categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation, commonly related to injection issues). The CVSS 3.1 base score is 6.2, indicating a medium severity with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N, meaning the attack requires local access (local vector), low attack complexity, no privileges, no user interaction, and impacts integrity but not confidentiality or availability. No patches or fixes have been published at the time of disclosure, and no known exploits have been detected in the wild. The vulnerability allows unauthorized call placement, which could lead to financial fraud, unauthorized premium calls, or disruption of user trust. Since the exploit requires only a local app installation without permissions or user interaction, it poses a significant risk especially on devices where users install untrusted apps. The vulnerability is limited to devices running the affected version of the NLL com.nll.cb app, which is an Android telephony application.
Potential Impact
The primary impact of CVE-2024-36064 is unauthorized integrity violation through silent phone call initiation by malicious apps without any permissions or user interaction. This can lead to financial losses if calls are made to premium-rate numbers, privacy breaches if calls are placed without user knowledge, and potential reputational damage for organizations relying on the affected app. Although confidentiality and availability are not directly impacted, the unauthorized call capability can be exploited for fraud or social engineering attacks. The ease of exploitation (no permissions or UI interaction required) increases the risk, especially in environments where users install apps from untrusted sources. Organizations with employees or customers using the vulnerable app may face increased risk of fraud or abuse. The lack of patches increases exposure duration. The scope is limited to devices with the vulnerable app installed, but given Android's large market share, the affected user base could be substantial.
Mitigation Recommendations
To mitigate CVE-2024-36064, organizations and users should: 1) Monitor for official patches or updates from the NLL com.nll.cb app developer and apply them promptly once available. 2) Restrict installation of untrusted or unknown applications on devices running the vulnerable app to prevent malicious apps from exploiting the flaw. 3) Employ mobile device management (MDM) solutions to control app installations and monitor for suspicious behavior related to call initiation. 4) Use Android security features such as Play Protect and app permission reviews to limit exposure. 5) Consider disabling or uninstalling the vulnerable app if it is not essential. 6) For developers, implement strict intent validation and access control on exported components to prevent unauthorized intent handling. 7) Educate users about risks of installing apps from unknown sources and encourage vigilance regarding unexpected phone call behavior. These steps go beyond generic advice by focusing on controlling app installation, monitoring intent usage, and enforcing stricter component security.
Affected Countries
United States, India, Brazil, Indonesia, Russia, Germany, United Kingdom, France, Mexico, South Africa
CVE-2024-36064: n/a
Description
The NLL com.nll.cb (aka ACR Phone) application through 0.330-playStore-NoAccessibility-arm8 for Android allows any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.nll.cb.dialer.dialer.DialerActivity component.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-36064 is a vulnerability identified in the NLL com.nll.cb (also known as ACR Phone) Android application, specifically in versions up to 0.330-playStore-NoAccessibility-arm8. The flaw allows any installed application on the device, even those without any granted permissions, to initiate phone calls without any user interaction. This is achieved by sending a crafted intent to the vulnerable component com.nll.cb.dialer.dialer.DialerActivity, which lacks proper access control or intent validation. The vulnerability stems from improper intent filtering and insufficient validation, categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation, commonly related to injection issues). The CVSS 3.1 base score is 6.2, indicating a medium severity with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N, meaning the attack requires local access (local vector), low attack complexity, no privileges, no user interaction, and impacts integrity but not confidentiality or availability. No patches or fixes have been published at the time of disclosure, and no known exploits have been detected in the wild. The vulnerability allows unauthorized call placement, which could lead to financial fraud, unauthorized premium calls, or disruption of user trust. Since the exploit requires only a local app installation without permissions or user interaction, it poses a significant risk especially on devices where users install untrusted apps. The vulnerability is limited to devices running the affected version of the NLL com.nll.cb app, which is an Android telephony application.
Potential Impact
The primary impact of CVE-2024-36064 is unauthorized integrity violation through silent phone call initiation by malicious apps without any permissions or user interaction. This can lead to financial losses if calls are made to premium-rate numbers, privacy breaches if calls are placed without user knowledge, and potential reputational damage for organizations relying on the affected app. Although confidentiality and availability are not directly impacted, the unauthorized call capability can be exploited for fraud or social engineering attacks. The ease of exploitation (no permissions or UI interaction required) increases the risk, especially in environments where users install apps from untrusted sources. Organizations with employees or customers using the vulnerable app may face increased risk of fraud or abuse. The lack of patches increases exposure duration. The scope is limited to devices with the vulnerable app installed, but given Android's large market share, the affected user base could be substantial.
Mitigation Recommendations
To mitigate CVE-2024-36064, organizations and users should: 1) Monitor for official patches or updates from the NLL com.nll.cb app developer and apply them promptly once available. 2) Restrict installation of untrusted or unknown applications on devices running the vulnerable app to prevent malicious apps from exploiting the flaw. 3) Employ mobile device management (MDM) solutions to control app installations and monitor for suspicious behavior related to call initiation. 4) Use Android security features such as Play Protect and app permission reviews to limit exposure. 5) Consider disabling or uninstalling the vulnerable app if it is not essential. 6) For developers, implement strict intent validation and access control on exported components to prevent unauthorized intent handling. 7) Educate users about risks of installing apps from unknown sources and encourage vigilance regarding unexpected phone call behavior. These steps go beyond generic advice by focusing on controlling app installation, monitoring intent usage, and enforcing stricter component security.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-19T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c5bb7ef31ef0b56348e
Added to database: 2/25/2026, 9:40:43 PM
Last enriched: 2/26/2026, 4:59:03 AM
Last updated: 4/12/2026, 3:57:43 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.