There were three security vulnerabilities disclosed In pre -downloaded Android apps on smartphones with Ulefone and Krüger & Matz, which could include any app installed on the plant reset and encrypt the application.
A brief description of three disadvantages – this is the following –
- Cve-2024-13915 (CVSS rating: 6.9) – Pre -installed application “Com.Pri.factorytest” to the Ulefone and Krüger & Matz service, exposes “com.factorytest.emmc.factoryrevice”, which allows any installed application to perform the enchanting device.
- Cve-2014-13916 (CVSS assessment: 6.9)–on-installed “Com.pri.Applock” app on Kruger & Matz smartphones allows the user to encrypt any app using PIN users or using biometric data. The app also exposes the method “com.android.providers.settings.fingerprint.prifspshareprovider” “Request ()”, which allows any malicious application already installed on the device in some other ways to highlight the PIN.
- Cve-2014-13917 (CVSS Assessment: 8.3) – Pre -installed “Com.Pri.Applock” app on Kruger & Matz Smartphones exposed the activity “com.pr.Applock.lockui”, which allows any other malicious application, without provided by the Android system to enter arbitrary arbitrary arbitrary intention with privileges at the system level to a protective application.
During the use of the CVE-2024-13917, it is required that the opponent of the pins protection number, it can be chained by CVE-2024-13916 to trace PIN.
Cert Polska, who spoke in detail about the vulnerabilities, attributed to Szymon Chadam for a responsible disclosure. However, the exact status of the patch of these shortcomings remains unclear. The Hacker News turned to Ulefone and Krüger & Matz for additional comments and we will update the story when we hear back.