CVE-2024-8039

9.8 CRITICAL

📋 TL;DR

This vulnerability in the BoomPlayer mobile application allows attackers to take over user accounts due to improper permission configuration. It affects users of the BoomPlayer app on Android devices. The high CVSS score indicates critical severity with low attack complexity.

💻 Affected Systems

Products:
  • BoomPlayer mobile application
Versions: Specific vulnerable versions not specified in references
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the com.afmobi.boomplayer application domain configuration

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover allowing attackers to access personal data, make unauthorized purchases, or impersonate legitimate users.

🟠

Likely Case

Unauthorized access to user accounts leading to data theft, privacy violations, and potential financial loss.

🟢

If Mitigated

Limited impact with proper authentication controls and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Based on CVSS score and description, exploitation appears straightforward

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references

Vendor Advisory: https://security.tecno.com/SRC/securityUpdates?type=SA

Restart Required: Yes

Instructions:

1. Update BoomPlayer app from official app store 2. Verify app version is latest 3. Restart device after update

🔧 Temporary Workarounds

Disable or uninstall vulnerable app

android

Remove the vulnerable application until patched

adb uninstall com.afmobi.boomplayer

Restrict app permissions

android

Limit app permissions in Android settings

🧯 If You Can't Patch

  • Disable the BoomPlayer application entirely
  • Implement network segmentation to isolate affected devices

🔍 How to Verify

Check if Vulnerable:

Check if com.afmobi.boomplayer is installed and version matches vulnerable range

Check Version:

adb shell dumpsys package com.afmobi.boomplayer | grep versionName

Verify Fix Applied:

Verify app is updated to latest version from official store

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Multiple failed login attempts
  • Account access from unexpected locations

Network Indicators:

  • Suspicious API calls to BoomPlayer services
  • Unusual data exfiltration patterns

SIEM Query:

source="android_logs" app="com.afmobi.boomplayer" (event="auth_failure" OR event="account_takeover")

🔗 References

📤 Share & Export