Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-53936: n/a

0
Medium
VulnerabilityCVE-2024-53936cvecve-2024-53936
Published: Mon Jan 06 2025 (01/06/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-53936 is a medium severity vulnerability in the Android app 'Color Phone Call Screen' (com. asianmobile. callcolor) that allows any app without permissions to place phone calls silently by sending a crafted intent to a specific component. This flaw requires no user interaction or privileges, enabling potential abuse for unauthorized calls. The vulnerability impacts confidentiality, integrity, and availability to a limited extent, with a CVSS score of 6. 3. No known exploits are currently reported in the wild. Organizations using this app on Android devices should be aware of the risk of unauthorized call initiation, which could lead to financial fraud or privacy violations. Mitigation involves removing or restricting access to the vulnerable component and monitoring for suspicious call activity. Countries with high Android usage and significant deployment of this app are at greater risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:49:41 UTC

Technical Analysis

CVE-2024-53936 is a vulnerability identified in the Android application 'Color Phone Call Screen' (package name com.asianmobile.callcolor). The flaw resides in the app's component com.asianmobile.callcolor.ui.component.call.CallActivity, which improperly exposes functionality that allows any other installed application, even those without any permissions, to initiate phone calls silently by sending a crafted intent. This means that malicious apps can exploit this component to place calls without user consent or interaction, bypassing normal Android permission checks. The vulnerability has a CVSS 3.1 base score of 6.3, reflecting medium severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability rated as low (C:L/I:L/A:L). The flaw could be leveraged to make unauthorized calls, potentially leading to financial charges, privacy breaches, or denial of service through call spamming. No patches or fixes are currently listed, and no known exploits have been observed in the wild as of the publication date. The vulnerability highlights a design weakness in intent handling and component exposure within the app, which should be addressed by restricting intent filters or enforcing permission checks on the vulnerable component.

Potential Impact

The primary impact of CVE-2024-53936 is unauthorized phone call initiation by malicious apps without requiring any permissions or user interaction. This can lead to several adverse effects: financial loss due to premium or international calls, privacy violations through call metadata exposure, potential harassment or denial of service by call spamming, and erosion of user trust in affected devices. While the confidentiality, integrity, and availability impacts are rated low individually, the combined effect can be significant for users and organizations relying on the affected app. Enterprises with Android devices using this app may face increased risk of fraud or operational disruption. The lack of required permissions and user interaction lowers the barrier for exploitation, increasing the threat surface. However, the attack vector is adjacent network, meaning the attacker must have some level of access to the device or network environment. Since no known exploits are reported, the immediate risk is moderate but could escalate if weaponized.

Mitigation Recommendations

To mitigate CVE-2024-53936, organizations and users should: 1) Identify and uninstall the 'Color Phone Call Screen' app if it is not essential, especially in enterprise environments. 2) If the app is required, monitor for updates or patches from the vendor and apply them promptly once available. 3) Use mobile device management (MDM) solutions to restrict installation of untrusted or unnecessary apps that could exploit this vulnerability. 4) Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) tools to detect suspicious call initiation patterns. 5) Restrict or audit intent communications on Android devices using security frameworks or custom policies to prevent unauthorized intents targeting vulnerable components. 6) Educate users about risks of installing apps from untrusted sources and the importance of monitoring call logs for unexpected activity. 7) Network-level controls can be used to detect and block unusual call traffic patterns. These steps go beyond generic advice by focusing on controlling the vulnerable component's exposure and monitoring for exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-11-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bc4b7ef31ef0b55ac2a

Added to database: 2/25/2026, 9:38:12 PM

Last enriched: 2/26/2026, 1:49:41 AM

Last updated: 2/26/2026, 6:13:13 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats