Preinstalled Android Apps Found Leaking PINs and Executing Malicious Commands

On May 30, 2025, CERT Polska took the lead in revealing three notable security vulnerabilities that impact preinstalled Android applications on smartphones produced by Ulefone and Krüger&Matz. These vulnerabilities, identified as CVE-2024-13915, CVE-2024-13916, and CVE-2024-13917, pose significant risks to users, including unauthorized device resets, potential theft of sensitive PIN codes, and privilege escalation by malicious applications.

Technical Breakdown of the Vulnerabilities

The following table encapsulates the essential details of the reported vulnerabilities:

CVE ID Product Vendor(s) Affected Versions CWE Type & Description
CVE-2024-13915 com.pri.factorytest Ulefone, Krüger&Matz All through 1.0 CWE-926: Improper Export of Android Application Components – Unrestricted access to FactoryResetService enables factory reset by any app.
CVE-2024-13916 com.pri.applock Krüger&Matz 13 CWE-497: Exposure of Sensitive System Information – Malicious apps can steal the user’s PIN via an exported content provider.
CVE-2024-13917 com.pri.applock Krüger&Matz 13 CWE-926: Improper Export of Android Application Components – Exposed activity allows privilege escalation with knowledge of the PIN.

Factory Reset Service Exposure

The com.pri.factorytest application, which comes preinstalled on devices from Ulefone and Krüger&Matz, exposes the com.pri.factorytest.emmc.FactoryResetService. Due to inadequate export controls, any installed application can invoke this service, potentially executing a full factory reset and erasing all user data without consent. This vulnerability falls under CWE-926, which pertains to failures in properly restricting exported Android components, thus allowing unauthorized app interactions.

xml

AppLock PIN Exfiltration

On Krüger&Matz devices, the com.pri.applock application is designed to secure other applications using a user-defined PIN or biometric data. However, the com.android.providers.settings.fingerprint.PriFpShareProvider content provider exposes a public query() method, enabling any app, regardless of permissions, to extract the user’s PIN. This scenario exemplifies CWE-497, where sensitive system information is made accessible to unauthorized entities.

javaCursor cursor = getContentResolver().query(
    Uri.parse("content://com.android.providers.settings.fingerprint.PriFpShareProvider"),
    null, null, null, null);
// Malicious app can read PIN from cursor

Intent Injection via Exposed Activity

Additionally, the com.pri.applock (version 13) is affected by an exported activity, com.pri.applock.LockUI, which can be invoked by any application. A malicious app could inject arbitrary intents with system-level privileges into protected applications, provided it has access to the PIN, which can be compromised via CVE-2024-13916. This situation again illustrates CWE-926, highlighting the improper export of Android components that can lead to privilege escalation and unauthorized access.

xml

Coordinated Disclosure and Security Implications

CERT Polska has effectively managed the responsible disclosure process, underscoring the significance of coordinated vulnerability management within the Android ecosystem. These vulnerabilities highlight the urgent need for stringent export controls on Android components and the robust protection of sensitive user data. Users of the affected devices are encouraged to seek firmware updates or mitigations from their vendors and to remain vigilant regarding app permissions and any unusual behavior exhibited by their devices.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

AppWizard
Preinstalled Android Apps Found Leaking PINs and Executing Malicious Commands