CVE-2024-36064: n/a
CVE-2024-36064 is a medium severity vulnerability in the NLL com. nll. cb (ACR Phone) Android application, allowing any installed app without permissions to initiate phone calls silently by sending a crafted intent to the DialerActivity component. This issue arises from insufficient access control on the intent handling, enabling unauthorized call initiation without user interaction. The vulnerability does not impact confidentiality or availability but compromises integrity by allowing unauthorized actions. Exploitation requires local access to install an app but no special permissions or user interaction. No known exploits are reported in the wild, and no patches have been published yet. Organizations relying on this app for telephony should monitor for updates and consider restricting app installations or intent handling. Countries with high Android usage and significant deployment of this app are at greater risk. The CVSS score is 6.
AI Analysis
Technical Summary
CVE-2024-36064 is a vulnerability identified in the NLL com.nll.cb (also known as ACR Phone) Android application, specifically in versions up to 0.330-playStore-NoAccessibility-arm8. The flaw allows any installed application on the device, even those without any granted permissions, to initiate phone calls without any user interaction. This is achieved by sending a crafted intent to the vulnerable component com.nll.cb.dialer.dialer.DialerActivity, which lacks proper access control or intent validation. The vulnerability stems from improper intent filtering and insufficient validation, categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation, commonly related to injection issues). The CVSS 3.1 base score is 6.2, indicating a medium severity with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N, meaning the attack requires local access (local vector), low attack complexity, no privileges, no user interaction, and impacts integrity but not confidentiality or availability. No patches or fixes have been published at the time of disclosure, and no known exploits have been detected in the wild. The vulnerability allows unauthorized call placement, which could lead to financial fraud, unauthorized premium calls, or disruption of user trust. Since the exploit requires only a local app installation without permissions or user interaction, it poses a significant risk especially on devices where users install untrusted apps. The vulnerability is limited to devices running the affected version of the NLL com.nll.cb app, which is an Android telephony application.
Potential Impact
The primary impact of CVE-2024-36064 is unauthorized integrity violation through silent phone call initiation by malicious apps without any permissions or user interaction. This can lead to financial losses if calls are made to premium-rate numbers, privacy breaches if calls are placed without user knowledge, and potential reputational damage for organizations relying on the affected app. Although confidentiality and availability are not directly impacted, the unauthorized call capability can be exploited for fraud or social engineering attacks. The ease of exploitation (no permissions or UI interaction required) increases the risk, especially in environments where users install apps from untrusted sources. Organizations with employees or customers using the vulnerable app may face increased risk of fraud or abuse. The lack of patches increases exposure duration. The scope is limited to devices with the vulnerable app installed, but given Android's large market share, the affected user base could be substantial.
Mitigation Recommendations
To mitigate CVE-2024-36064, organizations and users should: 1) Monitor for official patches or updates from the NLL com.nll.cb app developer and apply them promptly once available. 2) Restrict installation of untrusted or unknown applications on devices running the vulnerable app to prevent malicious apps from exploiting the flaw. 3) Employ mobile device management (MDM) solutions to control app installations and monitor for suspicious behavior related to call initiation. 4) Use Android security features such as Play Protect and app permission reviews to limit exposure. 5) Consider disabling or uninstalling the vulnerable app if it is not essential. 6) For developers, implement strict intent validation and access control on exported components to prevent unauthorized intent handling. 7) Educate users about risks of installing apps from unknown sources and encourage vigilance regarding unexpected phone call behavior. These steps go beyond generic advice by focusing on controlling app installation, monitoring intent usage, and enforcing stricter component security.
Affected Countries
United States, India, Brazil, Indonesia, Russia, Germany, United Kingdom, France, Mexico, South Africa
CVE-2024-36064: n/a
Description
CVE-2024-36064 is a medium severity vulnerability in the NLL com. nll. cb (ACR Phone) Android application, allowing any installed app without permissions to initiate phone calls silently by sending a crafted intent to the DialerActivity component. This issue arises from insufficient access control on the intent handling, enabling unauthorized call initiation without user interaction. The vulnerability does not impact confidentiality or availability but compromises integrity by allowing unauthorized actions. Exploitation requires local access to install an app but no special permissions or user interaction. No known exploits are reported in the wild, and no patches have been published yet. Organizations relying on this app for telephony should monitor for updates and consider restricting app installations or intent handling. Countries with high Android usage and significant deployment of this app are at greater risk. The CVSS score is 6.
AI-Powered Analysis
Technical Analysis
CVE-2024-36064 is a vulnerability identified in the NLL com.nll.cb (also known as ACR Phone) Android application, specifically in versions up to 0.330-playStore-NoAccessibility-arm8. The flaw allows any installed application on the device, even those without any granted permissions, to initiate phone calls without any user interaction. This is achieved by sending a crafted intent to the vulnerable component com.nll.cb.dialer.dialer.DialerActivity, which lacks proper access control or intent validation. The vulnerability stems from improper intent filtering and insufficient validation, categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation, commonly related to injection issues). The CVSS 3.1 base score is 6.2, indicating a medium severity with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N, meaning the attack requires local access (local vector), low attack complexity, no privileges, no user interaction, and impacts integrity but not confidentiality or availability. No patches or fixes have been published at the time of disclosure, and no known exploits have been detected in the wild. The vulnerability allows unauthorized call placement, which could lead to financial fraud, unauthorized premium calls, or disruption of user trust. Since the exploit requires only a local app installation without permissions or user interaction, it poses a significant risk especially on devices where users install untrusted apps. The vulnerability is limited to devices running the affected version of the NLL com.nll.cb app, which is an Android telephony application.
Potential Impact
The primary impact of CVE-2024-36064 is unauthorized integrity violation through silent phone call initiation by malicious apps without any permissions or user interaction. This can lead to financial losses if calls are made to premium-rate numbers, privacy breaches if calls are placed without user knowledge, and potential reputational damage for organizations relying on the affected app. Although confidentiality and availability are not directly impacted, the unauthorized call capability can be exploited for fraud or social engineering attacks. The ease of exploitation (no permissions or UI interaction required) increases the risk, especially in environments where users install apps from untrusted sources. Organizations with employees or customers using the vulnerable app may face increased risk of fraud or abuse. The lack of patches increases exposure duration. The scope is limited to devices with the vulnerable app installed, but given Android's large market share, the affected user base could be substantial.
Mitigation Recommendations
To mitigate CVE-2024-36064, organizations and users should: 1) Monitor for official patches or updates from the NLL com.nll.cb app developer and apply them promptly once available. 2) Restrict installation of untrusted or unknown applications on devices running the vulnerable app to prevent malicious apps from exploiting the flaw. 3) Employ mobile device management (MDM) solutions to control app installations and monitor for suspicious behavior related to call initiation. 4) Use Android security features such as Play Protect and app permission reviews to limit exposure. 5) Consider disabling or uninstalling the vulnerable app if it is not essential. 6) For developers, implement strict intent validation and access control on exported components to prevent unauthorized intent handling. 7) Educate users about risks of installing apps from unknown sources and encourage vigilance regarding unexpected phone call behavior. These steps go beyond generic advice by focusing on controlling app installation, monitoring intent usage, and enforcing stricter component security.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-19T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c5bb7ef31ef0b56348e
Added to database: 2/25/2026, 9:40:43 PM
Last enriched: 2/26/2026, 4:59:03 AM
Last updated: 2/26/2026, 7:47:10 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.