CVE-2024-13916

An application "com.pri.applock", which is pre-loaded on Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data. Exposed ”com.android.providers.settings.fingerprint.PriFpShareProvider“ content provider's public method query() allows any other malicious application, without any granted Android system permissions, to exfiltrate the PIN code. Only version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. Application update was released in April 2025.
CVSS

No CVSS.

Configurations

No configuration.

History

10 Jun 2025, 10:15

Type Values Removed Values Added
Summary
  • (es) La aplicación "com.pri.applock", preinstalada en los smartphones Kruger&Matz, permite cifrar cualquier aplicación mediante el código PIN proporcionado por el usuario o datos biométricos. El método público "query()" del proveedor de contenido "com.android.providers.settings.fingerprint.PriFpShareProvider", expuesto, permite que cualquier otra aplicación maliciosa, sin permisos del sistema Android, extraiga el código PIN. El proveedor no proporcionó información sobre las versiones vulnerables. Solo la versión (nombre de la versión: 13, código de la versión: 33) fue probada y se confirmó que presenta esta vulnerabilidad.
Summary (en) An application "com.pri.applock", which is pre-loaded on Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data. Exposed ”com.android.providers.settings.fingerprint.PriFpShareProvider“ content provider's public method query() allows any other malicious application, without any granted Android system permissions, to exfiltrate the PIN code. Vendor did not provide information about vulnerable versions. Only version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability (en) An application "com.pri.applock", which is pre-loaded on Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data. Exposed ”com.android.providers.settings.fingerprint.PriFpShareProvider“ content provider's public method query() allows any other malicious application, without any granted Android system permissions, to exfiltrate the PIN code. Only version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. Application update was released in April 2025.

30 May 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-30 16:15

Updated : 2025-06-10 10:15


NVD link : CVE-2024-13916

Mitre link : CVE-2024-13916

CVE.ORG link : CVE-2024-13916


JSON object : View

Products Affected

No product.

CWE
CWE-497

Exposure of Sensitive System Information to an Unauthorized Control Sphere