Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37573: n/a

0
High
VulnerabilityCVE-2024-37573cvecve-2024-37573
Published: Wed Oct 30 2024 (10/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-37573 is a high-severity vulnerability in the Talkatone Android app version 8. 4. 6 that allows any installed application, even without permissions, to place phone calls silently by exploiting the OutgoingCallInterceptor component. This flaw requires no user interaction or privileges, enabling attackers to initiate calls without consent, potentially leading to unauthorized charges, privacy breaches, and denial of service. The vulnerability stems from improper intent handling in the com. talkatone. vedroid. ui. launcher. OutgoingCallInterceptor component.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:13:02 UTC

Technical Analysis

CVE-2024-37573 is a vulnerability identified in the Talkatone Android application version 8.4.6, which allows any installed application on the device to place phone calls without requiring any permissions or user interaction. The root cause lies in the insecure handling of intents by the component com.talkatone.vedroid.ui.launcher.OutgoingCallInterceptor. Specifically, this component accepts crafted intents from any app, enabling the initiation of outgoing calls silently. This bypasses Android's normal permission model, which typically requires CALL_PHONE permission and user consent for placing calls. The vulnerability is rated with a CVSS 3.1 score of 8.4 (high severity), reflecting its potential for high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), meaning the attacker must have an app installed on the device but does not require privileges (PR:N) or user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H) because unauthorized calls can lead to privacy violations, financial loss, and service disruption. No patches or fixes have been published yet, and no known exploits are reported in the wild. This vulnerability highlights a critical flaw in intent validation and permission enforcement within the Talkatone app's call handling logic.

Potential Impact

The vulnerability allows any app installed on an Android device with Talkatone 8.4.6 to place phone calls without user knowledge or permission. This can lead to unauthorized premium-rate calls causing financial losses to users or organizations. Confidentiality is compromised as attackers can infer user activity or location through call patterns. Integrity is affected because attackers can manipulate call behavior, potentially interfering with legitimate communications. Availability is impacted as malicious apps could flood the phone system with calls, causing denial of service or battery drain. For organizations, this could result in unexpected telephony costs, reputational damage, and potential regulatory compliance issues related to user privacy. The lack of required permissions and user interaction lowers the barrier for exploitation, increasing the risk of widespread abuse if malicious apps are distributed via app stores or sideloaded. Although no exploits are currently known, the vulnerability's characteristics make it a significant threat to both individual users and enterprises relying on Talkatone for voice communications.

Mitigation Recommendations

Until an official patch is released, users and organizations should take proactive steps to mitigate this vulnerability. First, restrict installation of untrusted or unknown applications to reduce the risk of malicious apps exploiting this flaw. Employ mobile device management (MDM) solutions to enforce app whitelisting or blacklisting policies. Monitor device behavior for unusual outgoing call patterns that could indicate exploitation. Disable or uninstall the Talkatone app if it is not essential or replace it with a more secure alternative communication app. Developers and security teams should review and audit intent handling in their own apps to prevent similar issues. Once a patch is available, prioritize immediate update deployment. Additionally, consider implementing runtime application self-protection (RASP) or endpoint detection and response (EDR) tools capable of detecting unauthorized call attempts. Educate users about the risks of installing apps from unverified sources and the importance of scrutinizing app permissions and behaviors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c68b7ef31ef0b563c1e

Added to database: 2/25/2026, 9:40:56 PM

Last enriched: 2/26/2026, 5:13:02 AM

Last updated: 2/26/2026, 8:00:35 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats