Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36064: n/a

0
Medium
VulnerabilityCVE-2024-36064cvecve-2024-36064
Published: Thu Nov 07 2024 (11/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-36064 is a medium severity vulnerability in the NLL com. nll. cb (ACR Phone) Android application, allowing any installed app without permissions to initiate phone calls silently by sending a crafted intent to the DialerActivity component. This issue arises from insufficient access control on the intent handling, enabling unauthorized call initiation without user interaction. The vulnerability does not impact confidentiality or availability but compromises integrity by allowing unauthorized actions. Exploitation requires local access to install an app but no special permissions or user interaction. No known exploits are reported in the wild, and no patches have been published yet. Organizations relying on this app for telephony should monitor for updates and consider restricting app installations or intent handling. Countries with high Android usage and significant deployment of this app are at greater risk. The CVSS score is 6.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:59:03 UTC

Technical Analysis

CVE-2024-36064 is a vulnerability identified in the NLL com.nll.cb (also known as ACR Phone) Android application, specifically in versions up to 0.330-playStore-NoAccessibility-arm8. The flaw allows any installed application on the device, even those without any granted permissions, to initiate phone calls without any user interaction. This is achieved by sending a crafted intent to the vulnerable component com.nll.cb.dialer.dialer.DialerActivity, which lacks proper access control or intent validation. The vulnerability stems from improper intent filtering and insufficient validation, categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation, commonly related to injection issues). The CVSS 3.1 base score is 6.2, indicating a medium severity with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N, meaning the attack requires local access (local vector), low attack complexity, no privileges, no user interaction, and impacts integrity but not confidentiality or availability. No patches or fixes have been published at the time of disclosure, and no known exploits have been detected in the wild. The vulnerability allows unauthorized call placement, which could lead to financial fraud, unauthorized premium calls, or disruption of user trust. Since the exploit requires only a local app installation without permissions or user interaction, it poses a significant risk especially on devices where users install untrusted apps. The vulnerability is limited to devices running the affected version of the NLL com.nll.cb app, which is an Android telephony application.

Potential Impact

The primary impact of CVE-2024-36064 is unauthorized integrity violation through silent phone call initiation by malicious apps without any permissions or user interaction. This can lead to financial losses if calls are made to premium-rate numbers, privacy breaches if calls are placed without user knowledge, and potential reputational damage for organizations relying on the affected app. Although confidentiality and availability are not directly impacted, the unauthorized call capability can be exploited for fraud or social engineering attacks. The ease of exploitation (no permissions or UI interaction required) increases the risk, especially in environments where users install apps from untrusted sources. Organizations with employees or customers using the vulnerable app may face increased risk of fraud or abuse. The lack of patches increases exposure duration. The scope is limited to devices with the vulnerable app installed, but given Android's large market share, the affected user base could be substantial.

Mitigation Recommendations

To mitigate CVE-2024-36064, organizations and users should: 1) Monitor for official patches or updates from the NLL com.nll.cb app developer and apply them promptly once available. 2) Restrict installation of untrusted or unknown applications on devices running the vulnerable app to prevent malicious apps from exploiting the flaw. 3) Employ mobile device management (MDM) solutions to control app installations and monitor for suspicious behavior related to call initiation. 4) Use Android security features such as Play Protect and app permission reviews to limit exposure. 5) Consider disabling or uninstalling the vulnerable app if it is not essential. 6) For developers, implement strict intent validation and access control on exported components to prevent unauthorized intent handling. 7) Educate users about risks of installing apps from unknown sources and encourage vigilance regarding unexpected phone call behavior. These steps go beyond generic advice by focusing on controlling app installation, monitoring intent usage, and enforcing stricter component security.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c5bb7ef31ef0b56348e

Added to database: 2/25/2026, 9:40:43 PM

Last enriched: 2/26/2026, 4:59:03 AM

Last updated: 2/26/2026, 7:47:10 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats