Cyber Security News

Verizon Call Filter App Vulnerability Exposed Call Log Data of Customers

A vulnerability in Verizon’s Call Filter app for iOS has been discovered, allowing unauthorized access to customer call logs.

This flaw allowed any individual with the requisite technical knowledge to retrieve incoming call data—complete with timestamps—for any Verizon phone number, posing serious risks to privacy and safety.

The Vulnerability Unveiled

The Verizon Call Filter app is designed to help users block spam calls and manage call logs. However, a researcher recently found the app vulnerable to a serious security lapse.

At the core of this issue was the app’s interaction with Verizon’s servers to fetch call history data. A network request sent to the endpoint /clr/callLogRetrieval facilitated this retrieval.

A critical flaw lay in how the app failed to validate that the phone number being queried matched the phone number tied to the signed-in user.

By modifying the phone number in the request header (X-Ceq-MDN) while keeping a valid authorization token (JWT), an attacker could fetch call log data for any Verizon customer.

The JWT payload looked like this:

{

    "sub": "SIGNED_IN_USER_PHONE_NUMBER_HERE",

    "iat": "1740253712",

    "iss": "df88f1ed1dfd9a903e4c8dca7f00089e134c6c4e0a566cd565147ba1dadf78a6",

    "secret": "REDACTED",

    "alg": "ECDSA-256",

    "exp": "1740255512"

}

Why This Matters

Call logs might seem inconsequential, but they are far more revealing than they appear.

Metadata such as timestamps and call durations can paint a picture of an individual’s daily routine, personal relationships, and confidential contacts.

Example Vulnerable Request

For high-risk individuals like journalists, law enforcement officers, politicians, or domestic abuse survivors, such information falling into the wrong hands could have catastrophic consequences.

The breach impacts Verizon’s extensive customer base—possibly extending to all subscribers, as the Call Filter service is believed to be enabled by default.

The findings suggest that the vulnerability was not restricted to specific accounts or user groups.

The server hosting the vulnerable API appears to be owned by Cequint, a telecom technology company specializing in caller ID services.

This raises further questions about the security of customer data stored or managed by third-party contractors like Cequint, especially when such data is tied to one of the largest mobile carriers in the U.S.

While technical details of this vulnerability are now public, its discovery is a stark reminder of the need for vigilance in protecting digital identities.

Whether through stricter validations, internal audits, or addressing the role of third-party security lapses, it’s clear that carriers like Verizon must double down on keeping customer data safe.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a premier…

1 hour ago

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by empowering…

2 hours ago

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir Kutleshi,…

7 hours ago

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti Connect…

2 days ago

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing how…

2 days ago

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational…

2 days ago