CVE-2024-40239

6.8 MEDIUM

📋 TL;DR

An incorrect access control vulnerability in the Life: Personal Diary, Journal Android app allows physically proximate attackers to bypass fingerprint authentication and gain unauthorized access to private diary entries. This affects users of version 17.5.0 who have enabled fingerprint authentication for the app.

💻 Affected Systems

Products:
  • Life: Personal Diary, Journal
Versions: 17.5.0
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations where fingerprint authentication is enabled within the app. The vulnerability is in the app's implementation, not the Android OS fingerprint system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access to the device can read all private diary entries, potentially exposing sensitive personal information, thoughts, and confidential data.

🟠

Likely Case

Someone with brief physical access to an unlocked device could access the diary app without proper authentication, viewing recent entries and personal content.

🟢

If Mitigated

With proper device security controls (strong device passcode, biometrics), the window of opportunity is limited to when the device is unlocked and unattended.

🌐 Internet-Facing: LOW - This is a local physical access vulnerability requiring proximity to the device.
🏢 Internal Only: MEDIUM - Within environments where devices are shared or left unattended, this poses moderate risk of unauthorized data access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

The researcher's blog post demonstrates the bypass technique. Exploitation requires physical access to an unlocked device where the app is installed and fingerprint auth is enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

1. Check Google Play Store for app updates
2. Install any available updates for Life: Personal Diary, Journal
3. Monitor developer communications for security patches

🔧 Temporary Workarounds

Disable Fingerprint Authentication

android

Temporarily disable fingerprint authentication within the app settings

Use Device-Level Security

android

Ensure device has strong passcode/biometric lock and auto-lock enabled

🧯 If You Can't Patch

  • Disable fingerprint authentication in app settings and use passcode only
  • Keep device physically secure and never leave unlocked devices unattended

🔍 How to Verify

Check if Vulnerable:

Check app version in Google Play Store or app settings. If version is 17.5.0 and fingerprint auth is enabled, you are vulnerable.

Check Version:

Settings > Apps > Life: Personal Diary, Journal > App info

Verify Fix Applied:

Update app through Google Play Store and verify version is newer than 17.5.0. Test fingerprint authentication functionality.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed fingerprint attempts followed by successful access
  • Unusual access patterns to diary entries

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Not applicable for local app vulnerability

🔗 References

📤 Share & Export