CVE-2024-36063

7.5 HIGH

📋 TL;DR

This vulnerability allows any Android application without permissions to place phone calls without user interaction by sending a crafted intent to the Goodwy Dialer app. It affects all users of Goodwy Dialer (Right Dialer) for Android up to version 5.1.0. The attack requires an attacker to have installed a malicious app on the same device.

💻 Affected Systems

Products:
  • Goodwy Dialer (Right Dialer)
Versions: through 5.1.0
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could place premium-rate international calls, incurring significant financial costs for the victim, or make calls to emergency services causing false alarms and potential legal consequences.

🟠

Likely Case

Malicious apps could place unwanted calls to scam numbers, premium services, or contacts in the victim's address book, potentially leading to financial loss or social engineering attacks.

🟢

If Mitigated

With proper app sandboxing and intent filtering, the impact would be limited to calls being placed without user consent but potentially detectable through call logs.

🌐 Internet-Facing: LOW - This is a local Android app vulnerability, not directly internet-facing.
🏢 Internal Only: MEDIUM - Requires a malicious app on the same device, but Android's permission model should prevent this type of cross-app exploitation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit requires creating a malicious Android app that sends a crafted intent. No special permissions needed for the attacking app.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 5.1.0

Vendor Advisory: https://github.com/actuator/com.goodwy.dialer/blob/main/CVE-2024-36063

Restart Required: No

Instructions:

1. Open Google Play Store 2. Search for 'Goodwy Dialer' or 'Right Dialer' 3. Update to latest version 4. Verify version is greater than 5.1.0

🔧 Temporary Workarounds

Uninstall Goodwy Dialer

android

Remove the vulnerable application from the device

Settings > Apps > Goodwy Dialer > Uninstall

Use alternative dialer app

android

Replace Goodwy Dialer with a different dialer application

🧯 If You Can't Patch

  • Disable Goodwy Dialer as default phone app in Android settings
  • Install app from trusted sources only and review app permissions carefully

🔍 How to Verify

Check if Vulnerable:

Check app version in Settings > Apps > Goodwy Dialer. If version is 5.1.0 or lower, device is vulnerable.

Check Version:

adb shell dumpsys package com.goodwy.dialer | grep versionName

Verify Fix Applied:

Update app via Play Store and confirm version is greater than 5.1.0 in app info.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected phone call intents from other apps
  • DialerActivity receiving intents without user interaction

Network Indicators:

  • Unexpected outgoing calls in call logs
  • Calls to premium or international numbers without user history

SIEM Query:

Not applicable for mobile app vulnerability

🔗 References

📤 Share & Export