Categories: Cyber Security News

Preinstalled Apps Found Exploits PIN Codes and Executing Malicious Commands

A critical security vulnerabilities affecting smartphones from Ulefone and Krüger&Matz manufacturers, revealing that preinstalled applications contain serious flaws allowing unauthorized factory resets, PIN code theft, and arbitrary command injection.

The three Common Vulnerabilities and Exposures (CVEs) published on May 30, 2025, demonstrate how vendor-installed software can create significant security risks for millions of users worldwide.

The most destructive vulnerability, CVE-2024-13915, affects the “com.pri.factorytest” application preloaded on both Ulefone and Krüger&Matz devices.

This manufacturing diagnostic tool, running version 1.0, exposes a critical service component called “com.pri.factorytest.emmc.FactoryResetService” that any installed application can exploit to trigger a complete factory reset of the device.

The vulnerability stems from improper export of Android application components, classified under CWE-926.

Any malicious application installed on affected devices can invoke this service without requiring special permissions, effectively allowing attackers to remotely wipe user data, settings, and installed applications.

This represents a catastrophic security failure where a simple malicious app download could result in complete data loss.

Ulefone has addressed this issue in OS builds released after December 2024, while Krüger&Matz likely fixed it in builds from March 2025, though the vendor has not confirmed the exact timeline.

Notably, the application update did not increment the APK version number, making it difficult for users to determine if their devices remain vulnerable.

Preinstalled Apps

CVE-2024-13916 targets the “com.pri.applock” application on Krüger&Matz smartphones, which provides app-level encryption using PIN codes or biometric authentication.

The vulnerabilities lies in an exposed content provider called “com.android.providers.settings.fingerprint.PriFpShareProvider” that makes its query() method publicly accessible.

This design flaw, categorized as CWE-497 (Exposure of Sensitive System Information), allows any malicious application to exfiltrate user PIN codes without requiring any Android system permissions.

The vulnerabilities effectively renders the app lock security feature useless, as attackers can simply read the PIN code directly from the exposed data store.

Testing confirmed that version 13 (version code: 33) contains this vulnerabilities, though Krüger&Matz has not provided information about which versions remain affected.

This represents a fundamental breach of the principle of least privilege in Android security architecture.

Privilege Escalation

The third vulnerability, CVE-2024-13917, also affects the “com.pri.applock” application and allows malicious applications to inject arbitrary intents with system-level privileges into protected applications.

The exposed “com.pri.applock.LockUI” activity creates this security gap, enabling attackers to bypass application protections.

Exploitation requires knowledge of the protecting PIN number, which attackers can obtain by exploiting CVE-2024-13916.

Once armed with the PIN, malicious applications can inject commands that execute with elevated privileges, potentially compromising device security entirely.

According to the Report, this vulnerabilities demonstrates how multiple security vulnerabilities can chain together to create devastating attack scenarios.

The combination of PIN exfiltration and arbitrary intent injection effectively neutralizes the app lock mechanism while providing attackers with system-level access.

CERT Polska credited security researcher Szymon Chadam for the responsible disclosure of these vulnerabilities, highlighting the importance of independent security research in identifying critical flaws in consumer devices.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

The post Preinstalled Apps Found Exploits PIN Codes and Executing Malicious Commands appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Community action garden grants available for neighborhood groups in Rockford

ROCKFORD, Ill. (WTVO) — The Community Action Garden grants are now available for all neighborhood,…

2 hours ago

Illinois Senate battle set: Stratton vs. Tracy in 2026 showdown

Illinois Lt. Gov. Juliana Stratton, backed by Gov. J.B. Pritzker, will face Republican Don Tracy…

2 hours ago

US Senate Republicans launch debate on SAVE Act requiring photo ID to vote

The U.S. Capitol on March 3, 2026. (Photo by Jennifer Shutt/States Newsroom)WASHINGTON — U.S. Senate…

3 hours ago

Belvidere School Board releases survey findings on Facility Master Plans

The Belvidere School Board has released survey regarding their Masters Facility Plans. A big question…

3 hours ago

Darren Bailey secures Republican nomination, sets sights on Gov. Pritzker rematch

Darren Bailey has won the Republican nomination for Illinois Governor, promising to cut taxes, reduce…

3 hours ago

Grab Frank Herbert’s Dune Box Set at a Major Discount Before the Dune: Part 3 Hype Increases the Price

The new trailer for Dune: Part 3 just dropped and it looks incredible. The third…

5 hours ago

This website uses cookies.