Skip to main content

CVE-2025-43976: n/a

Medium
VulnerabilityCVE-2025-43976cvecve-2025-43976
Published: Mon Jul 21 2025 (07/21/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The com.enflick.android.tn2ndLine application through 24.17.1.0 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.enflick.android.TextNow.activities.DialerActivity component.

AI-Powered Analysis

AILast updated: 07/29/2025, 01:22:14 UTC

Technical Analysis

CVE-2025-43976 is a medium-severity vulnerability affecting the Android application com.enflick.android.tn2ndLine (commonly known as TextNow) through version 24.17.1.0. The vulnerability arises from the application's DialerActivity component (com.enflick.android.TextNow.activities.DialerActivity), which improperly exposes functionality that allows any installed application, even those without any permissions, to initiate phone calls silently without user interaction. This is achieved by sending a crafted intent to the vulnerable component. Because the vulnerable component does not enforce permission checks or user confirmation, malicious apps can exploit this flaw to place unauthorized calls, potentially leading to toll fraud, privacy violations, or indirect denial of service by exhausting call resources. The CVSS v3.1 base score is 4.3, reflecting a medium impact with low attack complexity, no privileges required, and no user interaction needed. The attack vector is physical (local), meaning the attacker must have an app installed on the device, but no special permissions or user actions are necessary to trigger the exploit. The vulnerability impacts confidentiality, integrity, and availability to a limited extent: confidentiality and integrity are affected because unauthorized calls can be placed, potentially leaking information or causing fraudulent charges; availability is impacted by possible resource exhaustion or disruption of legitimate calling capabilities. No known exploits are reported in the wild as of the publication date. No patches or fixes are currently linked, indicating that remediation may require vendor intervention or user action such as uninstalling or restricting the app. This vulnerability highlights the risks of insecure inter-component communication in Android apps, especially those handling sensitive telephony functions.

Potential Impact

For European organizations, the impact of CVE-2025-43976 depends largely on the prevalence of the TextNow app within their user base or employee devices. Organizations with Bring Your Own Device (BYOD) policies or those in sectors where employees use third-party communication apps may face risks of unauthorized call initiation, leading to potential financial losses from toll fraud or reputational damage if fraudulent calls are traced back to corporate devices. Privacy concerns arise as unauthorized calls could expose sensitive information or allow attackers to leverage the device for further attacks. Additionally, the vulnerability could be exploited to disrupt communication channels, impacting operational continuity. While the vulnerability requires a malicious app to be installed, the lack of permission requirements lowers the barrier for exploitation. European telecom providers could also see indirect impacts if large numbers of devices are exploited, potentially affecting network resources. However, since the attack vector is local and no remote exploitation is possible, the threat is more contained to device-level compromise rather than large-scale network attacks.

Mitigation Recommendations

To mitigate CVE-2025-43976, European organizations should: 1) Audit and restrict the installation of third-party apps, especially those from untrusted sources, to prevent malicious apps from being installed that could exploit this vulnerability. 2) Implement Mobile Device Management (MDM) solutions to control app permissions and monitor unusual calling behavior on corporate devices. 3) Educate users about the risks of installing apps from unknown developers and the importance of scrutinizing app permissions and behaviors. 4) Encourage or enforce the use of official, vetted communication apps rather than third-party dialers with known vulnerabilities. 5) Monitor telephony usage patterns for anomalies that could indicate unauthorized call activity. 6) Coordinate with the vendor (TextNow) to obtain patches or updates addressing this vulnerability and deploy them promptly once available. 7) Where possible, apply Android OS-level restrictions or security policies that limit inter-app communication or intent handling related to telephony functions. 8) Consider network-level controls to detect and block suspicious call patterns originating from devices known to have the vulnerable app installed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-21T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 687e59b5a83201eaac110ffa

Added to database: 7/21/2025, 3:16:05 PM

Last enriched: 7/29/2025, 1:22:14 AM

Last updated: 8/9/2025, 1:10:53 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats