CVE-2024-12603

9.8 CRITICAL

📋 TL;DR

A logic vulnerability in the Transsion AppLock mobile application allows attackers to bypass the application password protection. This affects users of the com.transsion.applock application on Android devices, potentially exposing protected apps and data to unauthorized access.

💻 Affected Systems

Products:
  • Transsion AppLock (com.transsion.applock)
Versions: Specific vulnerable versions not publicly detailed in references
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Transsion devices (Tecno, Infinix, Itel brands) and potentially other Android devices with this app installed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all apps protected by AppLock, allowing unauthorized access to sensitive applications like banking, messaging, and private photos.

🟠

Likely Case

Local attackers with physical access to the device bypass AppLock to access protected applications containing personal or sensitive information.

🟢

If Mitigated

Limited impact if device has strong physical security controls and users don't store highly sensitive data in protected apps.

🌐 Internet-Facing: LOW - This is primarily a local authentication bypass requiring physical or remote device access.
🏢 Internal Only: MEDIUM - Employees using vulnerable devices could have work applications bypassed if device is compromised.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires physical access to device or ability to interact with app interface. Logic flaws typically have low exploitation complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references

Vendor Advisory: https://security.tecno.com/SRC/securityUpdates

Restart Required: No

Instructions:

1. Open Google Play Store 2. Search for 'AppLock' 3. Check for updates 4. Update to latest version 5. Verify app version in settings

🔧 Temporary Workarounds

Uninstall AppLock

android

Remove the vulnerable application entirely

adb uninstall com.transsion.applock

Use Alternative AppLock

android

Replace with a different application locking solution

🧯 If You Can't Patch

  • Enable device-level encryption and strong lock screen password
  • Avoid storing highly sensitive data in apps protected only by AppLock

🔍 How to Verify

Check if Vulnerable:

Check if AppLock version is outdated in Google Play Store or app settings

Check Version:

adb shell dumpsys package com.transsion.applock | grep versionName

Verify Fix Applied:

Verify AppLock is updated to latest version and test password bypass attempts fail

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed AppLock unlock attempts followed by successful access
  • AppLock process crashes or unusual behavior

Network Indicators:

  • No network indicators - local vulnerability

SIEM Query:

Not applicable for local mobile app vulnerability

🔗 References

📤 Share & Export