Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40096: n/a

0
Low
VulnerabilityCVE-2024-40096cvecve-2024-40096
Published: Mon Aug 05 2024 (08/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-40096 is a low-severity vulnerability in the Android application 'Who - Caller ID, Spam Block' (com. cascadialabs. who) version 15. 0 that causes sensitive information to be written to the system log. This vulnerability involves information exposure through system logs (CWE-532), which can be accessed by other applications with appropriate permissions, potentially leaking user data. The vulnerability requires local access with limited privileges and does not require user interaction. There are no known exploits in the wild, and no patches have been published yet. The CVSS score is 3. 3, reflecting low impact primarily on confidentiality without affecting integrity or availability. Organizations using this app on Android devices should be aware of the risk of sensitive data exposure via logs and consider mitigation steps.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:36:50 UTC

Technical Analysis

CVE-2024-40096 identifies an information exposure vulnerability in the Android application 'Who - Caller ID, Spam Block' (package name com.cascadialabs.who), specifically version 15.0. The vulnerability arises because the application improperly logs sensitive information to the Android system log, which is accessible by other applications with the READ_LOGS permission or by users with physical or debugging access to the device. This is classified under CWE-532: Information Exposure Through Log Files. The exposure of sensitive data in logs can lead to privacy breaches if malicious apps or attackers gain access to these logs. The vulnerability has a CVSS v3.1 base score of 3.3, indicating low severity, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. This means the attack requires local access with low privileges, no user interaction, and impacts confidentiality only, without affecting integrity or availability. No patches or fixes have been published yet, and there are no known exploits in the wild. The vulnerability is primarily a privacy concern rather than a critical security risk but should be addressed to prevent potential data leakage. The affected versions are not explicitly detailed beyond version 15.0, and the vulnerability was published on August 5, 2024.

Potential Impact

The primary impact of this vulnerability is the potential exposure of sensitive user information through system logs. If an attacker or a malicious application gains access to these logs, they could extract personal data such as caller ID information, spam reports, or other sensitive details handled by the app. This could lead to privacy violations, targeted phishing, or social engineering attacks. However, the impact is limited by the requirement for local access and the need for permissions to read system logs, which are restricted on modern Android versions. There is no impact on data integrity or system availability, and no remote exploitation is possible. Organizations relying on this app for caller identification and spam blocking on employee devices could face privacy compliance issues if sensitive data is leaked. The risk is higher in environments where devices are shared, or where users install untrusted applications that might access logs. Overall, the impact is low but non-negligible for privacy-conscious users and organizations.

Mitigation Recommendations

To mitigate this vulnerability, users and organizations should: 1) Monitor for updates from the app developer and apply patches promptly once available. 2) Limit the installation of untrusted applications that request the READ_LOGS permission or have the capability to access system logs. 3) Use Android device management policies to restrict log access and enforce app permissions. 4) Consider disabling or uninstalling the 'Who - Caller ID, Spam Block' app if sensitive data exposure is a critical concern until a fix is released. 5) Employ mobile threat defense solutions that can detect anomalous access to logs or suspicious app behavior. 6) Educate users about the risks of installing apps from unverified sources and the importance of device security hygiene. 7) For organizations, audit devices for installed apps and review logs for suspicious access patterns. These steps go beyond generic advice by focusing on controlling log access and app permissions specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ca6b7ef31ef0b567291

Added to database: 2/25/2026, 9:41:58 PM

Last enriched: 2/26/2026, 6:36:50 AM

Last updated: 2/26/2026, 12:46:34 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats