Ulefone and Krüger&Matz smartphones found with dangerous preloaded app flaws

Ulefone and Krüger&Matz smartphones found with dangerous preloaded app flaws

Smartphones from Ulefone and Krüger&Matz are shipping with preloaded apps that contain serious security flaws, potentially allowing attackers to steal PIN codes, perform unauthorized factory resets, and gain system-level access, according to a report from CERT Polska, Poland’s national computer emergency response team.

The report discloses three critical vulnerabilities, tracked as CVE-2024-13915, CVE-2024-13916, and CVE-2024-13917, all stemming from insecure implementations in pre-installed applications on budget devices from the two manufacturers.

Ulefone is a Chinese smartphone maker, and Krüger&Matz is a Polish brand known for importing mobile devices and consumer electronics.

The most severe issue, CVE-2024-13917, was found in the “com.pri.applock” app preloaded on Krüger&Matz smartphones. The app is designed to lock access to other applications using a PIN or biometric authentication. However, CERT Polska found that the app’s activity is improperly exposed, allowing a malicious app without any system permissions to inject arbitrary intents and potentially execute actions with elevated privileges.

In practical terms, this could enable an attacker to reset the phone, disable security features, or manipulate protected apps, all without user consent or elevated permissions.

While CVE-2024-13917 requires the attacker to know the user's PIN, a separate flaw, CVE-2024-13916, could be exploited to extract that PIN without needing system-level permissions. A third vulnerability, CVE-2024-13915, impacts both brands and could enable a malicious app to remotely trigger a factory reset, effectively wiping user data and rendering the device unusable until reconfigured.

Back to the list

Latest Posts

Cyber Security Week in Review: June 20, 2025

Cyber Security Week in Review: June 20, 2025

In brief: the Langflow, TP-Link and Zyxel flaws exploited in the wild, Russian hackers use ASPs to infiltrate victims’ email accounts, and more
20 June 2025
Russian-linked hackers exploit Google App passwords in email espionage campaign

Russian-linked hackers exploit Google App passwords in email espionage campaign

Victims were tricked into creating and sharing ASPs under the mistaken belief that they are enabling secure communication with the US Department of State.
19 June 2025
FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

Using custom-developed malware, including ransomware such as LockerGoga, MegaCortex, HIVE and Dharma, the hackers encrypted data on corporate networks.
18 June 2025