CVE-2024-40096: n/a
CVE-2024-40096 is a low-severity vulnerability in the Android application 'Who - Caller ID, Spam Block' (com. cascadialabs. who) version 15. 0 that causes sensitive information to be written to the system log. This vulnerability involves information exposure through system logs (CWE-532), which can be accessed by other applications with appropriate permissions, potentially leaking user data. The vulnerability requires local access with limited privileges and does not require user interaction. There are no known exploits in the wild, and no patches have been published yet. The CVSS score is 3. 3, reflecting low impact primarily on confidentiality without affecting integrity or availability. Organizations using this app on Android devices should be aware of the risk of sensitive data exposure via logs and consider mitigation steps.
AI Analysis
Technical Summary
CVE-2024-40096 identifies an information exposure vulnerability in the Android application 'Who - Caller ID, Spam Block' (package name com.cascadialabs.who), specifically version 15.0. The vulnerability arises because the application improperly logs sensitive information to the Android system log, which is accessible by other applications with the READ_LOGS permission or by users with physical or debugging access to the device. This is classified under CWE-532: Information Exposure Through Log Files. The exposure of sensitive data in logs can lead to privacy breaches if malicious apps or attackers gain access to these logs. The vulnerability has a CVSS v3.1 base score of 3.3, indicating low severity, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. This means the attack requires local access with low privileges, no user interaction, and impacts confidentiality only, without affecting integrity or availability. No patches or fixes have been published yet, and there are no known exploits in the wild. The vulnerability is primarily a privacy concern rather than a critical security risk but should be addressed to prevent potential data leakage. The affected versions are not explicitly detailed beyond version 15.0, and the vulnerability was published on August 5, 2024.
Potential Impact
The primary impact of this vulnerability is the potential exposure of sensitive user information through system logs. If an attacker or a malicious application gains access to these logs, they could extract personal data such as caller ID information, spam reports, or other sensitive details handled by the app. This could lead to privacy violations, targeted phishing, or social engineering attacks. However, the impact is limited by the requirement for local access and the need for permissions to read system logs, which are restricted on modern Android versions. There is no impact on data integrity or system availability, and no remote exploitation is possible. Organizations relying on this app for caller identification and spam blocking on employee devices could face privacy compliance issues if sensitive data is leaked. The risk is higher in environments where devices are shared, or where users install untrusted applications that might access logs. Overall, the impact is low but non-negligible for privacy-conscious users and organizations.
Mitigation Recommendations
To mitigate this vulnerability, users and organizations should: 1) Monitor for updates from the app developer and apply patches promptly once available. 2) Limit the installation of untrusted applications that request the READ_LOGS permission or have the capability to access system logs. 3) Use Android device management policies to restrict log access and enforce app permissions. 4) Consider disabling or uninstalling the 'Who - Caller ID, Spam Block' app if sensitive data exposure is a critical concern until a fix is released. 5) Employ mobile threat defense solutions that can detect anomalous access to logs or suspicious app behavior. 6) Educate users about the risks of installing apps from unverified sources and the importance of device security hygiene. 7) For organizations, audit devices for installed apps and review logs for suspicious access patterns. These steps go beyond generic advice by focusing on controlling log access and app permissions specific to this vulnerability.
Affected Countries
United States, India, Brazil, Indonesia, Russia, Germany, United Kingdom, France, Mexico, South Africa
CVE-2024-40096: n/a
Description
CVE-2024-40096 is a low-severity vulnerability in the Android application 'Who - Caller ID, Spam Block' (com. cascadialabs. who) version 15. 0 that causes sensitive information to be written to the system log. This vulnerability involves information exposure through system logs (CWE-532), which can be accessed by other applications with appropriate permissions, potentially leaking user data. The vulnerability requires local access with limited privileges and does not require user interaction. There are no known exploits in the wild, and no patches have been published yet. The CVSS score is 3. 3, reflecting low impact primarily on confidentiality without affecting integrity or availability. Organizations using this app on Android devices should be aware of the risk of sensitive data exposure via logs and consider mitigation steps.
AI-Powered Analysis
Technical Analysis
CVE-2024-40096 identifies an information exposure vulnerability in the Android application 'Who - Caller ID, Spam Block' (package name com.cascadialabs.who), specifically version 15.0. The vulnerability arises because the application improperly logs sensitive information to the Android system log, which is accessible by other applications with the READ_LOGS permission or by users with physical or debugging access to the device. This is classified under CWE-532: Information Exposure Through Log Files. The exposure of sensitive data in logs can lead to privacy breaches if malicious apps or attackers gain access to these logs. The vulnerability has a CVSS v3.1 base score of 3.3, indicating low severity, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. This means the attack requires local access with low privileges, no user interaction, and impacts confidentiality only, without affecting integrity or availability. No patches or fixes have been published yet, and there are no known exploits in the wild. The vulnerability is primarily a privacy concern rather than a critical security risk but should be addressed to prevent potential data leakage. The affected versions are not explicitly detailed beyond version 15.0, and the vulnerability was published on August 5, 2024.
Potential Impact
The primary impact of this vulnerability is the potential exposure of sensitive user information through system logs. If an attacker or a malicious application gains access to these logs, they could extract personal data such as caller ID information, spam reports, or other sensitive details handled by the app. This could lead to privacy violations, targeted phishing, or social engineering attacks. However, the impact is limited by the requirement for local access and the need for permissions to read system logs, which are restricted on modern Android versions. There is no impact on data integrity or system availability, and no remote exploitation is possible. Organizations relying on this app for caller identification and spam blocking on employee devices could face privacy compliance issues if sensitive data is leaked. The risk is higher in environments where devices are shared, or where users install untrusted applications that might access logs. Overall, the impact is low but non-negligible for privacy-conscious users and organizations.
Mitigation Recommendations
To mitigate this vulnerability, users and organizations should: 1) Monitor for updates from the app developer and apply patches promptly once available. 2) Limit the installation of untrusted applications that request the READ_LOGS permission or have the capability to access system logs. 3) Use Android device management policies to restrict log access and enforce app permissions. 4) Consider disabling or uninstalling the 'Who - Caller ID, Spam Block' app if sensitive data exposure is a critical concern until a fix is released. 5) Employ mobile threat defense solutions that can detect anomalous access to logs or suspicious app behavior. 6) Educate users about the risks of installing apps from unverified sources and the importance of device security hygiene. 7) For organizations, audit devices for installed apps and review logs for suspicious access patterns. These steps go beyond generic advice by focusing on controlling log access and app permissions specific to this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-07-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ca6b7ef31ef0b567291
Added to database: 2/25/2026, 9:41:58 PM
Last enriched: 2/26/2026, 6:36:50 AM
Last updated: 2/26/2026, 12:46:34 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14343: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dokuzsoft Technology Ltd. E-Commerce Product
HighCVE-2026-1198: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Simple SA Simple.ERP
HighCVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.