CVE-2024-40096: n/a
The com.cascadialabs.who (aka Who - Caller ID, Spam Block) application 15.0 for Android places sensitive information in the system log.
AI Analysis
Technical Summary
CVE-2024-40096 identifies an information exposure vulnerability in the Android application 'Who - Caller ID, Spam Block' (package name com.cascadialabs.who), specifically version 15.0. The vulnerability arises because the application improperly logs sensitive information to the Android system log, which is accessible by other applications with the READ_LOGS permission or by users with physical or debugging access to the device. This is classified under CWE-532: Information Exposure Through Log Files. The exposure of sensitive data in logs can lead to privacy breaches if malicious apps or attackers gain access to these logs. The vulnerability has a CVSS v3.1 base score of 3.3, indicating low severity, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. This means the attack requires local access with low privileges, no user interaction, and impacts confidentiality only, without affecting integrity or availability. No patches or fixes have been published yet, and there are no known exploits in the wild. The vulnerability is primarily a privacy concern rather than a critical security risk but should be addressed to prevent potential data leakage. The affected versions are not explicitly detailed beyond version 15.0, and the vulnerability was published on August 5, 2024.
Potential Impact
The primary impact of this vulnerability is the potential exposure of sensitive user information through system logs. If an attacker or a malicious application gains access to these logs, they could extract personal data such as caller ID information, spam reports, or other sensitive details handled by the app. This could lead to privacy violations, targeted phishing, or social engineering attacks. However, the impact is limited by the requirement for local access and the need for permissions to read system logs, which are restricted on modern Android versions. There is no impact on data integrity or system availability, and no remote exploitation is possible. Organizations relying on this app for caller identification and spam blocking on employee devices could face privacy compliance issues if sensitive data is leaked. The risk is higher in environments where devices are shared, or where users install untrusted applications that might access logs. Overall, the impact is low but non-negligible for privacy-conscious users and organizations.
Mitigation Recommendations
To mitigate this vulnerability, users and organizations should: 1) Monitor for updates from the app developer and apply patches promptly once available. 2) Limit the installation of untrusted applications that request the READ_LOGS permission or have the capability to access system logs. 3) Use Android device management policies to restrict log access and enforce app permissions. 4) Consider disabling or uninstalling the 'Who - Caller ID, Spam Block' app if sensitive data exposure is a critical concern until a fix is released. 5) Employ mobile threat defense solutions that can detect anomalous access to logs or suspicious app behavior. 6) Educate users about the risks of installing apps from unverified sources and the importance of device security hygiene. 7) For organizations, audit devices for installed apps and review logs for suspicious access patterns. These steps go beyond generic advice by focusing on controlling log access and app permissions specific to this vulnerability.
Affected Countries
United States, India, Brazil, Indonesia, Russia, Germany, United Kingdom, France, Mexico, South Africa
CVE-2024-40096: n/a
Description
The com.cascadialabs.who (aka Who - Caller ID, Spam Block) application 15.0 for Android places sensitive information in the system log.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-40096 identifies an information exposure vulnerability in the Android application 'Who - Caller ID, Spam Block' (package name com.cascadialabs.who), specifically version 15.0. The vulnerability arises because the application improperly logs sensitive information to the Android system log, which is accessible by other applications with the READ_LOGS permission or by users with physical or debugging access to the device. This is classified under CWE-532: Information Exposure Through Log Files. The exposure of sensitive data in logs can lead to privacy breaches if malicious apps or attackers gain access to these logs. The vulnerability has a CVSS v3.1 base score of 3.3, indicating low severity, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. This means the attack requires local access with low privileges, no user interaction, and impacts confidentiality only, without affecting integrity or availability. No patches or fixes have been published yet, and there are no known exploits in the wild. The vulnerability is primarily a privacy concern rather than a critical security risk but should be addressed to prevent potential data leakage. The affected versions are not explicitly detailed beyond version 15.0, and the vulnerability was published on August 5, 2024.
Potential Impact
The primary impact of this vulnerability is the potential exposure of sensitive user information through system logs. If an attacker or a malicious application gains access to these logs, they could extract personal data such as caller ID information, spam reports, or other sensitive details handled by the app. This could lead to privacy violations, targeted phishing, or social engineering attacks. However, the impact is limited by the requirement for local access and the need for permissions to read system logs, which are restricted on modern Android versions. There is no impact on data integrity or system availability, and no remote exploitation is possible. Organizations relying on this app for caller identification and spam blocking on employee devices could face privacy compliance issues if sensitive data is leaked. The risk is higher in environments where devices are shared, or where users install untrusted applications that might access logs. Overall, the impact is low but non-negligible for privacy-conscious users and organizations.
Mitigation Recommendations
To mitigate this vulnerability, users and organizations should: 1) Monitor for updates from the app developer and apply patches promptly once available. 2) Limit the installation of untrusted applications that request the READ_LOGS permission or have the capability to access system logs. 3) Use Android device management policies to restrict log access and enforce app permissions. 4) Consider disabling or uninstalling the 'Who - Caller ID, Spam Block' app if sensitive data exposure is a critical concern until a fix is released. 5) Employ mobile threat defense solutions that can detect anomalous access to logs or suspicious app behavior. 6) Educate users about the risks of installing apps from unverified sources and the importance of device security hygiene. 7) For organizations, audit devices for installed apps and review logs for suspicious access patterns. These steps go beyond generic advice by focusing on controlling log access and app permissions specific to this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-07-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ca6b7ef31ef0b567291
Added to database: 2/25/2026, 9:41:58 PM
Last enriched: 2/26/2026, 6:36:50 AM
Last updated: 4/12/2026, 6:14:10 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.