CVE-2024-44336

5.3 MEDIUM

📋 TL;DR

This vulnerability in AnkiDroid allows attackers to access and copy internal application files from protected storage to publicly accessible locations. It affects users of AnkiDroid version 2.17.6 on Android devices. The exposure could lead to unauthorized access to sensitive user data stored by the application.

💻 Affected Systems

Products:
  • AnkiDroid
Versions: 2.17.6
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Android version 2.17.6 of AnkiDroid. Earlier or later versions may not be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate all user data including study progress, card collections, personal notes, and potentially authentication tokens, leading to complete compromise of user's AnkiDroid data and privacy.

🟠

Likely Case

Local attackers or malicious apps could access and copy study data, card collections, and user preferences, potentially exposing personal learning materials and study habits.

🟢

If Mitigated

With proper Android permissions and storage isolation, only apps with specific permissions or physical device access could exploit this, limiting exposure to sophisticated attacks.

🌐 Internet-Facing: LOW - This is primarily a local vulnerability requiring app installation or physical access to the device.
🏢 Internal Only: MEDIUM - Malicious apps on the same device could exploit this without user interaction, but requires Android permissions to access storage.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub. Exploitation requires malicious app installation or physical device access with debugging enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.17.7 or later

Vendor Advisory: https://github.com/ankidroid/Anki-Android/security/advisories

Restart Required: Yes

Instructions:

1. Open Google Play Store 2. Search for AnkiDroid 3. Update to version 2.17.7 or later 4. Restart the application

🔧 Temporary Workarounds

Disable USB Debugging

android

Prevents physical attackers from accessing device storage via ADB

Settings > Developer Options > USB Debugging (toggle off)

Restrict App Permissions

android

Review and limit storage permissions for all installed applications

Settings > Apps > [App Name] > Permissions > Storage (deny)

🧯 If You Can't Patch

  • Uninstall AnkiDroid 2.17.6 and use web version or alternative flashcard apps
  • Enable Android's Verify Apps feature to scan for malicious applications

🔍 How to Verify

Check if Vulnerable:

Check AnkiDroid version in app settings: Open AnkiDroid > Settings > About > Version number

Check Version:

Not applicable - check via app interface

Verify Fix Applied:

Confirm version is 2.17.7 or higher in app settings after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in /data/data/com.ichi2.anki/
  • Multiple file copy operations from protected to public storage

Network Indicators:

  • Unexpected outbound transfers of .apkg or .anki2 files if exfiltration occurs

SIEM Query:

Not typically applicable for mobile app vulnerabilities on personal devices

🔗 References

📤 Share & Export