CVE-2024-37575: n/a
CVE-2024-37575 is a high-severity vulnerability in the Mister org. mistergroup. shouldianswer Android application (version 1. 4. 264). It allows any installed app, even without permissions, to initiate phone calls without user interaction by exploiting the DefaultDialerActivity component via crafted intents. This vulnerability does not require user interaction or privileges, making exploitation straightforward. While no known exploits are currently in the wild, the impact on integrity is significant as unauthorized calls can be placed, potentially leading to financial loss or privacy breaches. The vulnerability stems from improper intent validation (CWE-281). Organizations using this app on Android devices are at risk, especially in regions with high usage of this application.
AI Analysis
Technical Summary
CVE-2024-37575 identifies a vulnerability in the Mister org.mistergroup.shouldianswer Android application, version 1.4.264. The flaw resides in the DefaultDialerActivity component (org.mistergroup.shouldianswer.ui.default_dialer.DefaultDialerActivity), which improperly handles intents. Specifically, any installed application on the device, regardless of its granted permissions, can send a crafted intent to this component to initiate phone calls without requiring user interaction or explicit permissions. This behavior violates the principle of least privilege and allows unauthorized call placement, which can lead to misuse such as unauthorized premium calls, call fraud, or privacy violations. The vulnerability is classified under CWE-281 (Improper Authentication), indicating that the component fails to authenticate or validate the source or legitimacy of the intent before acting. The CVSS 3.1 base score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, high integrity impact, and no availability impact. No patches have been published yet, and no active exploits have been reported. The vulnerability was reserved in June 2024 and published in December 2024. The lack of required permissions and user interaction makes this vulnerability particularly dangerous on Android devices where the app is installed.
Potential Impact
The primary impact of CVE-2024-37575 is on the integrity of telephony operations on affected Android devices. Unauthorized applications can place phone calls without user consent, potentially leading to financial losses through premium-rate calls or toll fraud. Privacy is also at risk as calls could be placed to numbers that expose user information or enable social engineering attacks. Organizations relying on Android devices with this app installed may face operational disruptions if unauthorized calls interfere with legitimate communications or incur unexpected costs. The vulnerability does not affect confidentiality or availability directly but can indirectly cause reputational damage and user trust erosion. Since no user interaction or permissions are required, the attack surface is broad, increasing the likelihood of exploitation if attackers target this vulnerability. The absence of known exploits currently provides a window for mitigation before widespread abuse occurs.
Mitigation Recommendations
To mitigate CVE-2024-37575, organizations and users should: 1) Monitor for updates from the Mister app developer and apply patches promptly once available. 2) Restrict installation of untrusted or unnecessary applications on devices with the vulnerable app to reduce the risk of malicious intent exploitation. 3) Employ mobile device management (MDM) solutions to enforce application whitelisting and restrict background intent sending capabilities. 4) Use Android security features such as intent filters and permission enforcement to limit which apps can interact with sensitive components like DefaultDialerActivity. 5) Audit device call logs and monitor for unusual call activity that may indicate exploitation. 6) Educate users about the risks of installing unknown applications and encourage vigilance regarding unexpected phone behavior. 7) If possible, disable or replace the vulnerable app with alternative call management solutions that follow secure intent handling practices. These steps go beyond generic advice by focusing on controlling inter-app communication and monitoring for abuse specific to this vulnerability.
Affected Countries
United States, India, Brazil, Indonesia, Russia, Germany, United Kingdom, France, Mexico, South Africa
CVE-2024-37575: n/a
Description
CVE-2024-37575 is a high-severity vulnerability in the Mister org. mistergroup. shouldianswer Android application (version 1. 4. 264). It allows any installed app, even without permissions, to initiate phone calls without user interaction by exploiting the DefaultDialerActivity component via crafted intents. This vulnerability does not require user interaction or privileges, making exploitation straightforward. While no known exploits are currently in the wild, the impact on integrity is significant as unauthorized calls can be placed, potentially leading to financial loss or privacy breaches. The vulnerability stems from improper intent validation (CWE-281). Organizations using this app on Android devices are at risk, especially in regions with high usage of this application.
AI-Powered Analysis
Technical Analysis
CVE-2024-37575 identifies a vulnerability in the Mister org.mistergroup.shouldianswer Android application, version 1.4.264. The flaw resides in the DefaultDialerActivity component (org.mistergroup.shouldianswer.ui.default_dialer.DefaultDialerActivity), which improperly handles intents. Specifically, any installed application on the device, regardless of its granted permissions, can send a crafted intent to this component to initiate phone calls without requiring user interaction or explicit permissions. This behavior violates the principle of least privilege and allows unauthorized call placement, which can lead to misuse such as unauthorized premium calls, call fraud, or privacy violations. The vulnerability is classified under CWE-281 (Improper Authentication), indicating that the component fails to authenticate or validate the source or legitimacy of the intent before acting. The CVSS 3.1 base score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, high integrity impact, and no availability impact. No patches have been published yet, and no active exploits have been reported. The vulnerability was reserved in June 2024 and published in December 2024. The lack of required permissions and user interaction makes this vulnerability particularly dangerous on Android devices where the app is installed.
Potential Impact
The primary impact of CVE-2024-37575 is on the integrity of telephony operations on affected Android devices. Unauthorized applications can place phone calls without user consent, potentially leading to financial losses through premium-rate calls or toll fraud. Privacy is also at risk as calls could be placed to numbers that expose user information or enable social engineering attacks. Organizations relying on Android devices with this app installed may face operational disruptions if unauthorized calls interfere with legitimate communications or incur unexpected costs. The vulnerability does not affect confidentiality or availability directly but can indirectly cause reputational damage and user trust erosion. Since no user interaction or permissions are required, the attack surface is broad, increasing the likelihood of exploitation if attackers target this vulnerability. The absence of known exploits currently provides a window for mitigation before widespread abuse occurs.
Mitigation Recommendations
To mitigate CVE-2024-37575, organizations and users should: 1) Monitor for updates from the Mister app developer and apply patches promptly once available. 2) Restrict installation of untrusted or unnecessary applications on devices with the vulnerable app to reduce the risk of malicious intent exploitation. 3) Employ mobile device management (MDM) solutions to enforce application whitelisting and restrict background intent sending capabilities. 4) Use Android security features such as intent filters and permission enforcement to limit which apps can interact with sensitive components like DefaultDialerActivity. 5) Audit device call logs and monitor for unusual call activity that may indicate exploitation. 6) Educate users about the risks of installing unknown applications and encourage vigilance regarding unexpected phone behavior. 7) If possible, disable or replace the vulnerable app with alternative call management solutions that follow secure intent handling practices. These steps go beyond generic advice by focusing on controlling inter-app communication and monitoring for abuse specific to this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-06-09T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c68b7ef31ef0b563c26
Added to database: 2/25/2026, 9:40:56 PM
Last enriched: 2/26/2026, 5:13:27 AM
Last updated: 2/26/2026, 6:47:13 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.