CVE-2024-37574: n/a
CVE-2024-37574 is a high-severity vulnerability in the GriceMobile Android application (com. grice. call) version 4. 5. 2 that allows any installed app without permissions to place phone calls silently by sending a crafted intent to com. iui. mobile. presentation. MobileActivity. This flaw requires no user interaction or privileges, enabling unauthorized call initiation.
AI Analysis
Technical Summary
CVE-2024-37574 identifies a vulnerability in the GriceMobile Android application (com.grice.call) version 4.5.2, where any installed application, even without any permissions, can initiate phone calls without user consent or interaction. This is achieved by sending a crafted intent to the component com.iui.mobile.presentation.MobileActivity, which improperly handles incoming intents and does not enforce permission checks or user confirmation before placing calls. The root cause is linked to CWE-732, which involves incorrect permissions or access control on critical operations. The vulnerability allows an attacker to exploit the phone's call functionality, potentially leading to unauthorized calls that could result in toll fraud, privacy violations, or disruption of user experience. The CVSS v3.1 score of 8.2 indicates a high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), high integrity impact (I:H), and no availability impact (A:N). No patches or known exploits are currently reported, but the vulnerability's nature makes it a significant risk for affected users.
Potential Impact
The vulnerability allows unauthorized applications to place phone calls silently, which can lead to several adverse impacts. Organizations may face financial losses due to toll fraud if attackers place premium-rate or international calls. Privacy is compromised as calls could be made without user knowledge, potentially leaking sensitive information or enabling stalking and harassment. The integrity of the device's telephony functions is undermined, reducing trust in the affected application and device security. Although availability is not impacted, the unauthorized call capability can disrupt normal phone usage and cause reputational damage. Enterprises relying on Android devices with this app installed may experience increased risk of insider threats or malware leveraging this flaw. The lack of required permissions and user interaction lowers the barrier for exploitation, increasing the threat surface significantly.
Mitigation Recommendations
Immediate mitigation involves restricting the installation of untrusted or unknown applications on devices running GriceMobile com.grice.call 4.5.2. Organizations should implement mobile device management (MDM) policies to control app installations and monitor unusual call activity. Users and administrators should check for updates or patches from GriceMobile and apply them as soon as available. If no patch exists, consider uninstalling or disabling the vulnerable app until remediation is provided. Developers and vendors must implement proper intent filtering and permission enforcement on sensitive components like MobileActivity to prevent unauthorized access. Additionally, monitoring telephony logs for unexpected call patterns can help detect exploitation attempts. Employing runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions on mobile devices may provide further detection capabilities. Educating users about the risks of installing untrusted apps can reduce exposure.
Affected Countries
United States, India, Brazil, Indonesia, Russia, Germany, United Kingdom, Mexico, France, South Africa
CVE-2024-37574: n/a
Description
CVE-2024-37574 is a high-severity vulnerability in the GriceMobile Android application (com. grice. call) version 4. 5. 2 that allows any installed app without permissions to place phone calls silently by sending a crafted intent to com. iui. mobile. presentation. MobileActivity. This flaw requires no user interaction or privileges, enabling unauthorized call initiation.
AI-Powered Analysis
Technical Analysis
CVE-2024-37574 identifies a vulnerability in the GriceMobile Android application (com.grice.call) version 4.5.2, where any installed application, even without any permissions, can initiate phone calls without user consent or interaction. This is achieved by sending a crafted intent to the component com.iui.mobile.presentation.MobileActivity, which improperly handles incoming intents and does not enforce permission checks or user confirmation before placing calls. The root cause is linked to CWE-732, which involves incorrect permissions or access control on critical operations. The vulnerability allows an attacker to exploit the phone's call functionality, potentially leading to unauthorized calls that could result in toll fraud, privacy violations, or disruption of user experience. The CVSS v3.1 score of 8.2 indicates a high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), high integrity impact (I:H), and no availability impact (A:N). No patches or known exploits are currently reported, but the vulnerability's nature makes it a significant risk for affected users.
Potential Impact
The vulnerability allows unauthorized applications to place phone calls silently, which can lead to several adverse impacts. Organizations may face financial losses due to toll fraud if attackers place premium-rate or international calls. Privacy is compromised as calls could be made without user knowledge, potentially leaking sensitive information or enabling stalking and harassment. The integrity of the device's telephony functions is undermined, reducing trust in the affected application and device security. Although availability is not impacted, the unauthorized call capability can disrupt normal phone usage and cause reputational damage. Enterprises relying on Android devices with this app installed may experience increased risk of insider threats or malware leveraging this flaw. The lack of required permissions and user interaction lowers the barrier for exploitation, increasing the threat surface significantly.
Mitigation Recommendations
Immediate mitigation involves restricting the installation of untrusted or unknown applications on devices running GriceMobile com.grice.call 4.5.2. Organizations should implement mobile device management (MDM) policies to control app installations and monitor unusual call activity. Users and administrators should check for updates or patches from GriceMobile and apply them as soon as available. If no patch exists, consider uninstalling or disabling the vulnerable app until remediation is provided. Developers and vendors must implement proper intent filtering and permission enforcement on sensitive components like MobileActivity to prevent unauthorized access. Additionally, monitoring telephony logs for unexpected call patterns can help detect exploitation attempts. Employing runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions on mobile devices may provide further detection capabilities. Educating users about the risks of installing untrusted apps can reduce exposure.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-06-09T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c68b7ef31ef0b563c21
Added to database: 2/25/2026, 9:40:56 PM
Last enriched: 2/26/2026, 5:13:14 AM
Last updated: 2/26/2026, 6:16:25 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.