Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45240: n/a

0
High
VulnerabilityCVE-2024-45240cvecve-2024-45240
Published: Sat Aug 24 2024 (08/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-45240 is a high-severity vulnerability in the TikTok Android application (com. zhiliaoapp. musically) before version 34. 5. 5. It allows an attacker to take over the Lynxview JavaScript interfaces exposed by the app's WebView through deeplink traversal. On devices running Android 12 and later, exploitation is limited to third-party applications, requiring local app installation. The vulnerability can lead to full compromise of confidentiality, integrity, and availability of the affected app environment without user interaction or privileges. No known exploits are currently reported in the wild. Organizations using TikTok on Android devices should prioritize updating to version 34.

AI-Powered Analysis

AILast updated: 02/26/2026, 08:10:52 UTC

Technical Analysis

CVE-2024-45240 is a vulnerability affecting the TikTok Android application prior to version 34.5.5. The flaw resides in the application's exposed WebView component, specifically in the Lynxview JavaScript interfaces. Through deeplink traversal, an attacker can hijack these JavaScript interfaces, potentially allowing malicious code execution within the context of the app. This can lead to unauthorized access to sensitive data, manipulation of app behavior, or disruption of service. On Android 12 and later, exploitation is restricted to third-party applications, meaning an attacker must have an app installed on the device to leverage this vulnerability. The vulnerability does not require user interaction or privileges, increasing its risk profile. The CVSS v3.1 score of 7.4 reflects high impact on confidentiality, integrity, and availability, with a local attack vector and high attack complexity. No public exploits have been reported yet, but the potential for abuse remains significant given TikTok's widespread use. The vulnerability underscores the risks inherent in exposed WebView interfaces and the importance of secure deeplink handling in mobile applications.

Potential Impact

This vulnerability can have severe consequences for organizations and individuals using TikTok on Android devices. Exploitation could allow attackers to execute arbitrary JavaScript code within the app's WebView context, leading to data theft, unauthorized actions, or app disruption. For enterprises, this could result in leakage of sensitive user information or compromise of corporate devices if TikTok is installed. The fact that no user interaction or privileges are required (except for third-party app installation on Android 12+) increases the attack surface. Given TikTok's popularity globally, especially among younger demographics and in regions with high Android penetration, the impact could be widespread. Additionally, attackers could use this vulnerability as a foothold for further attacks or lateral movement within compromised devices. The absence of known exploits in the wild reduces immediate risk but does not diminish the urgency for patching.

Mitigation Recommendations

The primary mitigation is to update the TikTok Android application to version 34.5.5 or later, where this vulnerability is addressed. Organizations should enforce app update policies on managed devices to ensure timely patching. Additionally, restricting installation of untrusted third-party applications on Android 12 and later devices can reduce exploitation risk, as the vulnerability requires a malicious app to be present. Employing mobile threat defense solutions that monitor app behavior and detect anomalous WebView activity can provide additional protection. Developers should audit exposed WebView interfaces and implement strict deeplink validation to prevent traversal attacks. Users should be educated about the risks of installing unknown apps and encouraged to keep their applications updated. Network-level controls to monitor and block suspicious traffic originating from mobile devices may also help detect exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-24T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ceab7ef31ef0b56a33c

Added to database: 2/25/2026, 9:43:06 PM

Last enriched: 2/26/2026, 8:10:52 AM

Last updated: 2/26/2026, 11:09:03 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats