CVE-2024-52614

4.0 MEDIUM

📋 TL;DR

The Kura Sushi Official App for Android versions before 3.8.5 contains a hard-coded cryptographic key vulnerability. This allows local attackers to potentially extract login credentials stored by the app. Only Android users running vulnerable app versions are affected.

💻 Affected Systems

Products:
  • Kura Sushi Official App Produced by EPARK
Versions: Android versions prior to 3.8.5
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Android version of the app. Requires local access to the device or a malicious app with appropriate permissions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with physical access to the device could extract stored login IDs and passwords, potentially leading to account compromise and unauthorized access to user accounts.

🟠

Likely Case

Malicious apps on the same device could access the hard-coded key and decrypt stored credentials, leading to credential theft.

🟢

If Mitigated

With app isolation and proper device security controls, only apps with specific permissions could exploit this vulnerability.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: MEDIUM with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the device or a malicious app with storage access permissions. The hard-coded key can be extracted from the app package.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.8.5

Vendor Advisory: https://jvn.jp/en/jp/JVN16114985/

Restart Required: Yes

Instructions:

1. Open Google Play Store 2. Search for 'Kura Sushi Official App' 3. Update to version 3.8.5 or later 4. Restart the app after update

🔧 Temporary Workarounds

Uninstall vulnerable app

android

Remove the vulnerable app version until update is available

adb uninstall jp.co.kura_corpo

Restrict app permissions

android

Limit app storage access to reduce attack surface

Go to Settings > Apps > Kura Sushi > Permissions > Disable Storage access

🧯 If You Can't Patch

  • Isolate the app using Android work profile or secure folder
  • Monitor for suspicious activity and change passwords regularly

🔍 How to Verify

Check if Vulnerable:

Check app version in Google Play Store or Settings > Apps > Kura Sushi > App info

Check Version:

adb shell dumpsys package jp.co.kura_corpo | grep versionName

Verify Fix Applied:

Confirm app version is 3.8.5 or higher in app settings

📡 Detection & Monitoring

Log Indicators:

  • Unusual app data access patterns
  • Multiple failed login attempts

Network Indicators:

  • Unexpected credential-related network traffic

SIEM Query:

app:"Kura Sushi" AND version:<3.8.5

🔗 References

📤 Share & Export