Vulnerabilites related to samsung - galaxy_s4
CVE-2016-7991 (GCVE-0-2016-7991)
Vulnerability from cvelistv5
Published
2016-10-31 10:00
Modified
2024-08-06 02:13
Severity ?
Summary
On Samsung Galaxy S4 through S7 devices, the "omacp" app ignores security information embedded in the OMACP messages resulting in remote unsolicited WAP Push SMS messages being accepted, parsed, and handled by the device, leading to unauthorized configuration changes, a subset of SVE-2016-6542.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T02:13:21.791Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "94088",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/94088",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-10-31T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "On Samsung Galaxy S4 through S7 devices, the \"omacp\" app ignores security information embedded in the OMACP messages resulting in remote unsolicited WAP Push SMS messages being accepted, parsed, and handled by the device, leading to unauthorized configuration changes, a subset of SVE-2016-6542.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-11-25T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "94088",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/94088",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-7991",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "On Samsung Galaxy S4 through S7 devices, the \"omacp\" app ignores security information embedded in the OMACP messages resulting in remote unsolicited WAP Push SMS messages being accepted, parsed, and handled by the device, leading to unauthorized configuration changes, a subset of SVE-2016-6542.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "94088",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/94088",
                  },
                  {
                     name: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
                     refsource: "CONFIRM",
                     url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-7991",
      datePublished: "2016-10-31T10:00:00",
      dateReserved: "2016-09-09T00:00:00",
      dateUpdated: "2024-08-06T02:13:21.791Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2016-7988 (GCVE-0-2016-7988)
Vulnerability from cvelistv5
Published
2016-10-31 10:00
Modified
2024-08-06 02:13
Severity ?
Summary
On Samsung Galaxy S4 through S7 devices, absence of permissions on the BroadcastReceiver responsible for handling the com.[Samsung].android.intent.action.SET_WIFI intent leads to unsolicited configuration messages being handled by wifi-service.jar within the Android Framework, a subset of SVE-2016-6542.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T02:13:21.422Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
               },
               {
                  name: "94081",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/94081",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-10-31T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "On Samsung Galaxy S4 through S7 devices, absence of permissions on the BroadcastReceiver responsible for handling the com.[Samsung].android.intent.action.SET_WIFI intent leads to unsolicited configuration messages being handled by wifi-service.jar within the Android Framework, a subset of SVE-2016-6542.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-11-25T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
            },
            {
               name: "94081",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/94081",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-7988",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "On Samsung Galaxy S4 through S7 devices, absence of permissions on the BroadcastReceiver responsible for handling the com.[Samsung].android.intent.action.SET_WIFI intent leads to unsolicited configuration messages being handled by wifi-service.jar within the Android Framework, a subset of SVE-2016-6542.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
                     refsource: "CONFIRM",
                     url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
                  },
                  {
                     name: "94081",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/94081",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-7988",
      datePublished: "2016-10-31T10:00:00",
      dateReserved: "2016-09-09T00:00:00",
      dateUpdated: "2024-08-06T02:13:21.422Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2013-4763 (GCVE-0-2013-4763)
Vulnerability from cvelistv5
Published
2019-12-27 16:08
Modified
2024-08-06 16:52
Severity ?
Summary
Samsung Galaxy S3/S4 exposes an unprotected component allowing arbitrary SMS text messages without requesting permission.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T16:52:27.131Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://archives.neohapsis.com/archives/bugtraq/2013-07/0108.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.securityfocus.com/bid/61280",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Samsung Galaxy S3/S4 exposes an unprotected component allowing arbitrary SMS text messages without requesting permission.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-27T16:08:15",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://archives.neohapsis.com/archives/bugtraq/2013-07/0108.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.securityfocus.com/bid/61280",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2013-4763",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Samsung Galaxy S3/S4 exposes an unprotected component allowing arbitrary SMS text messages without requesting permission.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://archives.neohapsis.com/archives/bugtraq/2013-07/0108.html",
                     refsource: "MISC",
                     url: "http://archives.neohapsis.com/archives/bugtraq/2013-07/0108.html",
                  },
                  {
                     name: "https://www.securityfocus.com/bid/61280",
                     refsource: "MISC",
                     url: "https://www.securityfocus.com/bid/61280",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2013-4763",
      datePublished: "2019-12-27T16:08:15",
      dateReserved: "2013-07-05T00:00:00",
      dateUpdated: "2024-08-06T16:52:27.131Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2016-7989 (GCVE-0-2016-7989)
Vulnerability from cvelistv5
Published
2016-10-31 10:00
Modified
2024-08-06 02:13
Severity ?
Summary
On Samsung Galaxy S4 through S7 devices, a malformed OTA WAP PUSH SMS containing an OMACP message sent remotely triggers an unhandled ArrayIndexOutOfBoundsException in Samsung's implementation of the WifiServiceImpl class within wifi-service.jar. This causes the Android runtime to continually crash, rendering the device unusable until a factory reset is performed, a subset of SVE-2016-6542.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T02:13:21.260Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
               },
               {
                  name: "94082",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/94082",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-10-31T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "On Samsung Galaxy S4 through S7 devices, a malformed OTA WAP PUSH SMS containing an OMACP message sent remotely triggers an unhandled ArrayIndexOutOfBoundsException in Samsung's implementation of the WifiServiceImpl class within wifi-service.jar. This causes the Android runtime to continually crash, rendering the device unusable until a factory reset is performed, a subset of SVE-2016-6542.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-11-25T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
            },
            {
               name: "94082",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/94082",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-7989",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "On Samsung Galaxy S4 through S7 devices, a malformed OTA WAP PUSH SMS containing an OMACP message sent remotely triggers an unhandled ArrayIndexOutOfBoundsException in Samsung's implementation of the WifiServiceImpl class within wifi-service.jar. This causes the Android runtime to continually crash, rendering the device unusable until a factory reset is performed, a subset of SVE-2016-6542.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
                     refsource: "CONFIRM",
                     url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
                  },
                  {
                     name: "94082",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/94082",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-7989",
      datePublished: "2016-10-31T10:00:00",
      dateReserved: "2016-09-09T00:00:00",
      dateUpdated: "2024-08-06T02:13:21.260Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2015-1801 (GCVE-0-2015-1801)
Vulnerability from cvelistv5
Published
2017-08-24 20:00
Modified
2024-08-06 04:54
Severity ?
Summary
The samsung_extdisp driver in the Samsung S4 (GT-I9500) I9500XXUEMK8 kernel 3.4 and earlier allows attackers to cause a denial of service (memory corruption) or gain privileges.
References
http://www.openwall.com/lists/oss-security/2015/09/21/13mailing-list, x_refsource_MLIST
http://www.securityfocus.com/bid/76807vdb-entry, x_refsource_BID
http://www.openwall.com/lists/oss-security/2015/09/21/4mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T04:54:16.249Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[oss-security] 20150921 Re: Samsung S4 (GT-I9500) multiple kernel vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2015/09/21/13",
               },
               {
                  name: "76807",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/76807",
               },
               {
                  name: "[oss-security] 20150921 Samsung S4 (GT-I9500) multiple kernel vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2015/09/21/4",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-09-21T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The samsung_extdisp driver in the Samsung S4 (GT-I9500) I9500XXUEMK8 kernel 3.4 and earlier allows attackers to cause a denial of service (memory corruption) or gain privileges.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-24T19:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "[oss-security] 20150921 Re: Samsung S4 (GT-I9500) multiple kernel vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2015/09/21/13",
            },
            {
               name: "76807",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/76807",
            },
            {
               name: "[oss-security] 20150921 Samsung S4 (GT-I9500) multiple kernel vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2015/09/21/4",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2015-1801",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The samsung_extdisp driver in the Samsung S4 (GT-I9500) I9500XXUEMK8 kernel 3.4 and earlier allows attackers to cause a denial of service (memory corruption) or gain privileges.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "[oss-security] 20150921 Re: Samsung S4 (GT-I9500) multiple kernel vulnerabilities",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2015/09/21/13",
                  },
                  {
                     name: "76807",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/76807",
                  },
                  {
                     name: "[oss-security] 20150921 Samsung S4 (GT-I9500) multiple kernel vulnerabilities",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2015/09/21/4",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2015-1801",
      datePublished: "2017-08-24T20:00:00",
      dateReserved: "2015-02-17T00:00:00",
      dateUpdated: "2024-08-06T04:54:16.249Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2016-4032 (GCVE-0-2016-4032)
Vulnerability from cvelistv5
Published
2017-04-13 16:00
Modified
2024-08-06 00:17
Severity ?
Summary
Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices do not block AT+USBDEBUG and AT+WIFIVALUE, which allows attackers to modify Android settings by leveraging AT access, aka SVE-2016-5301.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T00:17:29.844Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
               },
               {
                  name: "97650",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/97650",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2017-04-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices do not block AT+USBDEBUG and AT+WIFIVALUE, which allows attackers to modify Android settings by leveraging AT access, aka SVE-2016-5301.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-17T09:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
            },
            {
               name: "97650",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/97650",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-4032",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices do not block AT+USBDEBUG and AT+WIFIVALUE, which allows attackers to modify Android settings by leveraging AT access, aka SVE-2016-5301.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
                     refsource: "MISC",
                     url: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
                  },
                  {
                     name: "97650",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/97650",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-4032",
      datePublished: "2017-04-13T16:00:00",
      dateReserved: "2016-04-15T00:00:00",
      dateUpdated: "2024-08-06T00:17:29.844Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2019-12762 (GCVE-0-2019-12762)
Vulnerability from cvelistv5
Published
2019-06-06 19:45
Modified
2024-08-04 23:32
Severity ?
Summary
Xiaomi Mi 5s Plus devices allow attackers to trigger touchscreen anomalies via a radio signal between 198 kHz and 203 kHz, as demonstrated by a transmitter and antenna hidden just beneath the surface of a coffee-shop table, aka Ghost Touch.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T23:32:54.710Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://medium.com/%40juliodellaflora/ghost-touch-on-xiaomi-mi5s-plus-707998308607",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://hackercombat.com/nfc-vulnerability-may-promote-ghost-screen-taps/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Xiaomi Mi 5s Plus devices allow attackers to trigger touchscreen anomalies via a radio signal between 198 kHz and 203 kHz, as demonstrated by a transmitter and antenna hidden just beneath the surface of a coffee-shop table, aka Ghost Touch.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-06-06T19:45:22",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://medium.com/%40juliodellaflora/ghost-touch-on-xiaomi-mi5s-plus-707998308607",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://hackercombat.com/nfc-vulnerability-may-promote-ghost-screen-taps/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-12762",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Xiaomi Mi 5s Plus devices allow attackers to trigger touchscreen anomalies via a radio signal between 198 kHz and 203 kHz, as demonstrated by a transmitter and antenna hidden just beneath the surface of a coffee-shop table, aka Ghost Touch.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://medium.com/@juliodellaflora/ghost-touch-on-xiaomi-mi5s-plus-707998308607",
                     refsource: "MISC",
                     url: "https://medium.com/@juliodellaflora/ghost-touch-on-xiaomi-mi5s-plus-707998308607",
                  },
                  {
                     name: "https://hackercombat.com/nfc-vulnerability-may-promote-ghost-screen-taps/",
                     refsource: "MISC",
                     url: "https://hackercombat.com/nfc-vulnerability-may-promote-ghost-screen-taps/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-12762",
      datePublished: "2019-06-06T19:45:22",
      dateReserved: "2019-06-06T00:00:00",
      dateUpdated: "2024-08-04T23:32:54.710Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2015-1800 (GCVE-0-2015-1800)
Vulnerability from cvelistv5
Published
2017-08-24 20:00
Modified
2024-08-06 04:54
Severity ?
Summary
The samsung_extdisp driver in the Samsung S4 (GT-I9500) I9500XXUEMK8 kernel 3.4 and earlier allows attackers to potentially obtain sensitive information.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T04:54:16.154Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[oss-security] 20150921 Re: Samsung S4 (GT-I9500) multiple kernel vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2015/09/21/13",
               },
               {
                  name: "76807",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/76807",
               },
               {
                  name: "[oss-security] 20150921 Samsung S4 (GT-I9500) multiple kernel vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2015/09/21/4",
               },
               {
                  name: "[oss-security] 20150922 Re: Samsung S4 (GT-I9500) multiple kernel vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2015/09/22/18",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-09-21T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The samsung_extdisp driver in the Samsung S4 (GT-I9500) I9500XXUEMK8 kernel 3.4 and earlier allows attackers to potentially obtain sensitive information.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-24T19:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "[oss-security] 20150921 Re: Samsung S4 (GT-I9500) multiple kernel vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2015/09/21/13",
            },
            {
               name: "76807",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/76807",
            },
            {
               name: "[oss-security] 20150921 Samsung S4 (GT-I9500) multiple kernel vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2015/09/21/4",
            },
            {
               name: "[oss-security] 20150922 Re: Samsung S4 (GT-I9500) multiple kernel vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2015/09/22/18",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2015-1800",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The samsung_extdisp driver in the Samsung S4 (GT-I9500) I9500XXUEMK8 kernel 3.4 and earlier allows attackers to potentially obtain sensitive information.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "[oss-security] 20150921 Re: Samsung S4 (GT-I9500) multiple kernel vulnerabilities",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2015/09/21/13",
                  },
                  {
                     name: "76807",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/76807",
                  },
                  {
                     name: "[oss-security] 20150921 Samsung S4 (GT-I9500) multiple kernel vulnerabilities",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2015/09/21/4",
                  },
                  {
                     name: "[oss-security] 20150922 Re: Samsung S4 (GT-I9500) multiple kernel vulnerabilities",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2015/09/22/18",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2015-1800",
      datePublished: "2017-08-24T20:00:00",
      dateReserved: "2015-02-17T00:00:00",
      dateUpdated: "2024-08-06T04:54:16.154Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2016-4030 (GCVE-0-2016-4030)
Vulnerability from cvelistv5
Published
2017-04-13 16:00
Modified
2024-08-06 00:17
Severity ?
Summary
Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices have unintended availability of the modem in USB configuration number 2 within the secure lockscreen state, allowing an attacker to make phone calls, send text messages, or issue commands, aka SVE-2016-5301.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T00:17:30.659Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
               },
               {
                  name: "97701",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/97701",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2017-04-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices have unintended availability of the modem in USB configuration number 2 within the secure lockscreen state, allowing an attacker to make phone calls, send text messages, or issue commands, aka SVE-2016-5301.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-18T09:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
            },
            {
               name: "97701",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/97701",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-4030",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices have unintended availability of the modem in USB configuration number 2 within the secure lockscreen state, allowing an attacker to make phone calls, send text messages, or issue commands, aka SVE-2016-5301.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
                     refsource: "MISC",
                     url: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
                  },
                  {
                     name: "97701",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/97701",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-4030",
      datePublished: "2017-04-13T16:00:00",
      dateReserved: "2016-04-15T00:00:00",
      dateUpdated: "2024-08-06T00:17:30.659Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2016-4031 (GCVE-0-2016-4031)
Vulnerability from cvelistv5
Published
2017-04-13 16:00
Modified
2024-08-06 00:17
Severity ?
Summary
Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices allow attackers to send AT commands by plugging the device into a Linux host, aka SVE-2016-5301.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T00:17:30.670Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
               },
               {
                  name: "97703",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/97703",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2017-04-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices allow attackers to send AT commands by plugging the device into a Linux host, aka SVE-2016-5301.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-18T09:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
            },
            {
               name: "97703",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/97703",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-4031",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices allow attackers to send AT commands by plugging the device into a Linux host, aka SVE-2016-5301.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
                     refsource: "MISC",
                     url: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
                  },
                  {
                     name: "97703",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/97703",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-4031",
      datePublished: "2017-04-13T16:00:00",
      dateReserved: "2016-04-15T00:00:00",
      dateUpdated: "2024-08-06T00:17:30.670Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2015-4640 (GCVE-0-2015-4640)
Vulnerability from cvelistv5
Published
2015-06-19 14:00
Modified
2024-08-06 06:18
Severity ?
Summary
The SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices relies on an HTTP connection to the skslm.swiftkey.net server, which allows man-in-the-middle attackers to write to language-pack files by modifying an HTTP response. NOTE: CVE-2015-4640 exploitation can be combined with CVE-2015-4641 exploitation for man-in-the-middle code execution.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T06:18:12.041Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.nowsecure.com/keyboard-vulnerability/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/nowsecure/samsung-ime-rce-poc/",
               },
               {
                  name: "75347",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/75347",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/",
               },
               {
                  name: "VU#155412",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/155412",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-06-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices relies on an HTTP connection to the skslm.swiftkey.net server, which allows man-in-the-middle attackers to write to language-pack files by modifying an HTTP response.  NOTE: CVE-2015-4640 exploitation can be combined with CVE-2015-4641 exploitation for man-in-the-middle code execution.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-05T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.nowsecure.com/keyboard-vulnerability/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/nowsecure/samsung-ime-rce-poc/",
            },
            {
               name: "75347",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/75347",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/",
            },
            {
               name: "VU#155412",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/155412",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-4640",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices relies on an HTTP connection to the skslm.swiftkey.net server, which allows man-in-the-middle attackers to write to language-pack files by modifying an HTTP response.  NOTE: CVE-2015-4640 exploitation can be combined with CVE-2015-4641 exploitation for man-in-the-middle code execution.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.nowsecure.com/keyboard-vulnerability/",
                     refsource: "MISC",
                     url: "https://www.nowsecure.com/keyboard-vulnerability/",
                  },
                  {
                     name: "https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/",
                     refsource: "MISC",
                     url: "https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/",
                  },
                  {
                     name: "https://github.com/nowsecure/samsung-ime-rce-poc/",
                     refsource: "MISC",
                     url: "https://github.com/nowsecure/samsung-ime-rce-poc/",
                  },
                  {
                     name: "75347",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/75347",
                  },
                  {
                     name: "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/",
                     refsource: "MISC",
                     url: "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/",
                  },
                  {
                     name: "VU#155412",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/155412",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-4640",
      datePublished: "2015-06-19T14:00:00",
      dateReserved: "2015-06-17T00:00:00",
      dateUpdated: "2024-08-06T06:18:12.041Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2015-4641 (GCVE-0-2015-4641)
Vulnerability from cvelistv5
Published
2015-06-19 14:00
Modified
2024-08-06 06:18
Severity ?
Summary
Directory traversal vulnerability in the SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices allows remote web servers to write to arbitrary files, and consequently execute arbitrary code in a privileged context, by leveraging control of the skslm.swiftkey.net domain name and providing a .. (dot dot) in an entry in a ZIP archive, as demonstrated by a traversal to the /data/dalvik-cache directory.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T06:18:12.251Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.nowsecure.com/keyboard-vulnerability/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/nowsecure/samsung-ime-rce-poc/",
               },
               {
                  name: "75353",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/75353",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/",
               },
               {
                  name: "VU#155412",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/155412",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-06-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Directory traversal vulnerability in the SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices allows remote web servers to write to arbitrary files, and consequently execute arbitrary code in a privileged context, by leveraging control of the skslm.swiftkey.net domain name and providing a .. (dot dot) in an entry in a ZIP archive, as demonstrated by a traversal to the /data/dalvik-cache directory.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-05T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.nowsecure.com/keyboard-vulnerability/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/nowsecure/samsung-ime-rce-poc/",
            },
            {
               name: "75353",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/75353",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/",
            },
            {
               name: "VU#155412",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/155412",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-4641",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Directory traversal vulnerability in the SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices allows remote web servers to write to arbitrary files, and consequently execute arbitrary code in a privileged context, by leveraging control of the skslm.swiftkey.net domain name and providing a .. (dot dot) in an entry in a ZIP archive, as demonstrated by a traversal to the /data/dalvik-cache directory.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.nowsecure.com/keyboard-vulnerability/",
                     refsource: "MISC",
                     url: "https://www.nowsecure.com/keyboard-vulnerability/",
                  },
                  {
                     name: "https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/",
                     refsource: "MISC",
                     url: "https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/",
                  },
                  {
                     name: "https://github.com/nowsecure/samsung-ime-rce-poc/",
                     refsource: "MISC",
                     url: "https://github.com/nowsecure/samsung-ime-rce-poc/",
                  },
                  {
                     name: "75353",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/75353",
                  },
                  {
                     name: "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/",
                     refsource: "MISC",
                     url: "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/",
                  },
                  {
                     name: "VU#155412",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/155412",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-4641",
      datePublished: "2015-06-19T14:00:00",
      dateReserved: "2015-06-17T00:00:00",
      dateUpdated: "2024-08-06T06:18:12.251Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2016-7990 (GCVE-0-2016-7990)
Vulnerability from cvelistv5
Published
2016-10-31 10:00
Modified
2024-08-06 02:13
Severity ?
Summary
On Samsung Galaxy S4 through S7 devices, an integer overflow condition exists within libomacp.so when parsing OMACP messages (within WAP Push SMS messages) leading to a heap corruption that can result in Denial of Service and potentially remote code execution, a subset of SVE-2016-6542.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T02:13:21.617Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
               },
               {
                  name: "94086",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/94086",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-10-31T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "On Samsung Galaxy S4 through S7 devices, an integer overflow condition exists within libomacp.so when parsing OMACP messages (within WAP Push SMS messages) leading to a heap corruption that can result in Denial of Service and potentially remote code execution, a subset of SVE-2016-6542.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-11-25T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
            },
            {
               name: "94086",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/94086",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-7990",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "On Samsung Galaxy S4 through S7 devices, an integer overflow condition exists within libomacp.so when parsing OMACP messages (within WAP Push SMS messages) leading to a heap corruption that can result in Denial of Service and potentially remote code execution, a subset of SVE-2016-6542.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
                     refsource: "CONFIRM",
                     url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
                  },
                  {
                     name: "94086",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/94086",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-7990",
      datePublished: "2016-10-31T10:00:00",
      dateReserved: "2016-09-09T00:00:00",
      dateUpdated: "2024-08-06T02:13:21.617Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2013-4764 (GCVE-0-2013-4764)
Vulnerability from cvelistv5
Published
2019-12-27 16:11
Modified
2024-08-06 16:52
Severity ?
Summary
Samsung Galaxy S3/S4 exposes an unprotected component allowing an unprivileged app to send arbitrary SMS texts to arbitrary destinations without permission.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T16:52:27.137Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://shouji.360.cn/securityReportlist/CVE-2013-4764.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2013/Jul/107",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Samsung Galaxy S3/S4 exposes an unprotected component allowing an unprivileged app to send arbitrary SMS texts to arbitrary destinations without permission.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-27T16:11:53",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://shouji.360.cn/securityReportlist/CVE-2013-4764.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://seclists.org/bugtraq/2013/Jul/107",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2013-4764",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Samsung Galaxy S3/S4 exposes an unprotected component allowing an unprivileged app to send arbitrary SMS texts to arbitrary destinations without permission.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://shouji.360.cn/securityReportlist/CVE-2013-4764.html",
                     refsource: "MISC",
                     url: "http://shouji.360.cn/securityReportlist/CVE-2013-4764.html",
                  },
                  {
                     name: "https://seclists.org/bugtraq/2013/Jul/107",
                     refsource: "MISC",
                     url: "https://seclists.org/bugtraq/2013/Jul/107",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2013-4764",
      datePublished: "2019-12-27T16:11:53",
      dateReserved: "2013-07-05T00:00:00",
      dateUpdated: "2024-08-06T16:52:27.137Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2017-04-13 16:59
Modified
2024-11-21 02:51
Summary
Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices do not block AT+USBDEBUG and AT+WIFIVALUE, which allows attackers to modify Android settings by leveraging AT access, aka SVE-2016-5301.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s6_firmware:g920fxxu2coh2:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F1AFDE-A42D-4B25-8081-1BBA0319A138",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9C84354-75A3-4E55-A2D0-C0783AF36B37",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_note_3_firmware:n9005xxugbob6:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1A9C49-9E9E-4BD8-9AF2-3C1C281F82C5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_note_3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B148CE20-A498-4F1E-9C2D-C38F9F15292D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s4_mini_firmware:i9192xxubnb1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4957EA2-52E5-430F-8C88-342F42210296",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4_mini:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "721FDF15-999F-42C1-90C2-4708C6DB98B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s4_mini_lte_firmware:i9195xxucol1:*:*:*:*:*:*:*",
                     matchCriteriaId: "086D5334-9867-479D-8EE6-974794850C6C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4_mini_lte:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23C6FF67-C53E-4AAF-A3EF-2FCC448F0E6E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s4_firmware:i9505xxuhoj2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E2BC548-BCA0-4DAF-BA14-B8B135159E0F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717D895C-E64D-4E0E-9F4A-9B191E6388B6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices do not block AT+USBDEBUG and AT+WIFIVALUE, which allows attackers to modify Android settings by leveraging AT access, aka SVE-2016-5301.",
      },
      {
         lang: "es",
         value: "Samsung en los dispositivos SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), y GT-I9505 build I9505XXUHOJ2 (Galaxy S4) no bloquean AT+USBDEBUG y AT+WIFIVALUE, lo que permite a los atacantes modificar la configuración de Android aprovechando el acceso AT, también conocido como SVE-2016-5301.",
      },
   ],
   id: "CVE-2016-4032",
   lastModified: "2024-11-21T02:51:12.373",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "PHYSICAL",
               availabilityImpact: "NONE",
               baseScore: 4.6,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
               version: "3.0",
            },
            exploitabilityScore: 0.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-13T16:59:01.237",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/97650",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/97650",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-284",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-27 17:15
Modified
2024-11-21 01:56
Summary
Samsung Galaxy S3/S4 exposes an unprotected component allowing an unprivileged app to send arbitrary SMS texts to arbitrary destinations without permission.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s3_firmware:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D3302DA-625A-426E-96CF-718EEF95EEC1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A294254-1687-4340-BF07-06373FBFC072",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s4_firmware:1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E821AFAD-778B-41D4-B5A5-8AF70FC7DA6F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717D895C-E64D-4E0E-9F4A-9B191E6388B6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Samsung Galaxy S3/S4 exposes an unprotected component allowing an unprivileged app to send arbitrary SMS texts to arbitrary destinations without permission.",
      },
      {
         lang: "es",
         value: "Samsung Galaxy S3/S4, expone un componente desprotegido permitiendo a una aplicación no privilegiada enviar mensajes de texto arbitrarios a destinos arbitrarios sin permiso.",
      },
   ],
   id: "CVE-2013-4764",
   lastModified: "2024-11-21T01:56:21.520",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "PHYSICAL",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.7,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-27T17:15:15.357",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://shouji.360.cn/securityReportlist/CVE-2013-4764.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2013/Jul/107",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://shouji.360.cn/securityReportlist/CVE-2013-4764.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2013/Jul/107",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-276",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-06-19 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
Directory traversal vulnerability in the SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices allows remote web servers to write to arbitrary files, and consequently execute arbitrary code in a privileged context, by leveraging control of the skslm.swiftkey.net domain name and providing a .. (dot dot) in an entry in a ZIP archive, as demonstrated by a traversal to the /data/dalvik-cache directory.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:swiftkey:swiftkey_sdk:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "88F176E3-EC85-4B8C-B5DF-8EF79949F24E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2AC272-BB5F-4817-959D-2A4ECF1626E2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4_mini:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B11D6B24-F216-47CF-9614-F27940CBD091",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s5:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "41DE2B05-3057-4F9F-A33D-6A01B4E19E65",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s6:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "55A63E34-ACAD-4577-9965-02E294955906",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Directory traversal vulnerability in the SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices allows remote web servers to write to arbitrary files, and consequently execute arbitrary code in a privileged context, by leveraging control of the skslm.swiftkey.net domain name and providing a .. (dot dot) in an entry in a ZIP archive, as demonstrated by a traversal to the /data/dalvik-cache directory.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de salto de directorio en la implementación de la actualización del paquete de lenguas SwiftKey en los dispositivos Samsung Galaxy S4, S4 Mini, S5, y S6 permite servidores web remotos escribir en ficheros arbitrarios, y como consecuencia ejecutar código arbitrario en un contexto privilegiado, mediante el aprovechamiento del control del nombre de dominio skslm.swiftkey.net y la provisión de un .. (punto punto) en una entrada en un archivo ZIP, tal y como fue demostrado por un salto en el directorio /data/dalvik-cache.",
      },
   ],
   id: "CVE-2015-4641",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.4,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-06-19T14:59:02.630",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/155412",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/75353",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "https://github.com/nowsecure/samsung-ime-rce-poc/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "https://www.nowsecure.com/keyboard-vulnerability/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/155412",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/75353",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "https://github.com/nowsecure/samsung-ime-rce-poc/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "https://www.nowsecure.com/keyboard-vulnerability/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-10-31 10:59
Modified
2025-04-12 10:46
Summary
On Samsung Galaxy S4 through S7 devices, absence of permissions on the BroadcastReceiver responsible for handling the com.[Samsung].android.intent.action.SET_WIFI intent leads to unsolicited configuration messages being handled by wifi-service.jar within the Android Framework, a subset of SVE-2016-6542.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "49413FF7-7910-4F74-B106-C3170612CB2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2467F65-A3B7-4E45-A9A5-E5A6EFD99D7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8882E50-7C49-4A99-91F2-DF979CF8BB2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "98C32982-095C-4628-9958-118A3D3A9CAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FC0FCEA-0B3D-43C1-AB62-4F9C880B4CA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC75ED04-B8C7-4CC0-AC64-AE2D9E0CDF5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC13D3EE-CC89-4883-8E3D-3FE25FB8CF42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3CEEA22-63B4-4702-A400-01349DF0EC1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C4E6353-B77A-464F-B7DE-932704003B33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "77125688-2CCA-4990-ABB2-551D47CB0CDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9915371-C730-41F7-B86E-7E4DE0DF5385",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7A8EC00-266C-409B-AD43-18E8DFCD6FE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B846C63A-7261-481E-B4A4-0D8C79E0D8A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1D94CDD-DE7B-444E-A3AE-AE9C9A779374",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E70C6D8D-C9C3-4D92-8DFC-71F59E068295",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "691FA41B-C2CE-413F-ABB1-0B22CB322807",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717D895C-E64D-4E0E-9F4A-9B191E6388B6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4_mini:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "721FDF15-999F-42C1-90C2-4708C6DB98B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7060E1BD-9FFF-4D74-A2EE-20ABB447EA23",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9C84354-75A3-4E55-A2D0-C0783AF36B37",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s7:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F54653E7-88CD-4AA3-A2CD-BA0B116955F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "On Samsung Galaxy S4 through S7 devices, absence of permissions on the BroadcastReceiver responsible for handling the com.[Samsung].android.intent.action.SET_WIFI intent leads to unsolicited configuration messages being handled by wifi-service.jar within the Android Framework, a subset of SVE-2016-6542.",
      },
      {
         lang: "es",
         value: "En dispositivos Samsung Galaxy S4 hasta la versión S7, la ausencia de permisos en el responsable BroadcastReceiver de manejar los intentos com.[Samsung].android.intent.action.SET_WIFI lleva a que los mensajes de configuración no solicitados sean manejados por wifi-service.jar dentro del Android Framework, un subconjunto de SVE-2016-6542.",
      },
   ],
   id: "CVE-2016-7988",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-10-31T10:59:03.457",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94081",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94081",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-275",
            },
            {
               lang: "en",
               value: "CWE-388",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-06-06 20:29
Modified
2024-11-21 04:23
Summary
Xiaomi Mi 5s Plus devices allow attackers to trigger touchscreen anomalies via a radio signal between 198 kHz and 203 kHz, as demonstrated by a transmitter and antenna hidden just beneath the surface of a coffee-shop table, aka Ghost Touch.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:mi:mi_5s_plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D0C125-DF98-4616-9957-16F9F4A37DFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mi:mi_5s_plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2C8D05B-B851-41BD-A0C7-ED4B47A4CAA1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sony:xperia_z4_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BE6C7CA-1A0A-46D1-8807-476E8014F5C0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sony:xperia_z4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB52A381-4094-483C-BC6F-01E81BB2D3C3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s6_edge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7D8A184-3F01-49A1-98BE-B735296383B1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s6_edge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64C60E27-871F-4B77-87A5-9F9F20DCA2D3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s4_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5612A23E-43B3-4B13-89C1-6178C1737DAB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717D895C-E64D-4E0E-9F4A-9B191E6388B6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:nexus_7_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "183D2632-2F2A-4B17-9617-92509C31B702",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:google:nexus_7:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12357E84-6FAE-4C6B-8FD3-BD5457DBBBCE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:nexus_9_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "852FB43E-072C-4C96-ABEF-6F15E4F3C0F3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:google:nexus_9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1018566D-5DBE-44BD-BA05-1F6A6375C32F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sharp:aquos_zeta_sh-04f_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16E64A2E-16CB-4301-8A7C-F3765EF2B7BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sharp:aquos_zeta_sh-04f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D5DC700-E8CB-4A19-B704-5384ED7D3697",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fujitsu:arrows_nx_f05-f_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CDA25A7-839A-4870-8DE6-D2B0D2405F37",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:fujitsu:arrows_nx_f05-f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99C8B1DE-1EA8-405F-9D4E-5F6D96F4B6D4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Xiaomi Mi 5s Plus devices allow attackers to trigger touchscreen anomalies via a radio signal between 198 kHz and 203 kHz, as demonstrated by a transmitter and antenna hidden just beneath the surface of a coffee-shop table, aka Ghost Touch.",
      },
      {
         lang: "es",
         value: "Los dispositivos Xiaomi Mi 5s Plus permiten a los atacantes desencadenar anomalías de la pantalla táctil a través de una señal de radio entre 198 kHz y 203 kHz, como lo demuestra un transmisor y una antena ocultos justo debajo de la superficie de una mesa de cafetería, también conocida como Ghost Touch.",
      },
   ],
   id: "CVE-2019-12762",
   lastModified: "2024-11-21T04:23:31.383",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 1.9,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "PHYSICAL",
               availabilityImpact: "NONE",
               baseScore: 4.2,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.5,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-06-06T20:29:02.807",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://hackercombat.com/nfc-vulnerability-may-promote-ghost-screen-taps/",
      },
      {
         source: "cve@mitre.org",
         url: "https://medium.com/%40juliodellaflora/ghost-touch-on-xiaomi-mi5s-plus-707998308607",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://hackercombat.com/nfc-vulnerability-may-promote-ghost-screen-taps/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://medium.com/%40juliodellaflora/ghost-touch-on-xiaomi-mi5s-plus-707998308607",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-10-31 10:59
Modified
2025-04-12 10:46
Summary
On Samsung Galaxy S4 through S7 devices, the "omacp" app ignores security information embedded in the OMACP messages resulting in remote unsolicited WAP Push SMS messages being accepted, parsed, and handled by the device, leading to unauthorized configuration changes, a subset of SVE-2016-6542.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "49413FF7-7910-4F74-B106-C3170612CB2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2467F65-A3B7-4E45-A9A5-E5A6EFD99D7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8882E50-7C49-4A99-91F2-DF979CF8BB2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "98C32982-095C-4628-9958-118A3D3A9CAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FC0FCEA-0B3D-43C1-AB62-4F9C880B4CA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC75ED04-B8C7-4CC0-AC64-AE2D9E0CDF5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC13D3EE-CC89-4883-8E3D-3FE25FB8CF42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3CEEA22-63B4-4702-A400-01349DF0EC1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C4E6353-B77A-464F-B7DE-932704003B33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "77125688-2CCA-4990-ABB2-551D47CB0CDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9915371-C730-41F7-B86E-7E4DE0DF5385",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7A8EC00-266C-409B-AD43-18E8DFCD6FE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B846C63A-7261-481E-B4A4-0D8C79E0D8A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1D94CDD-DE7B-444E-A3AE-AE9C9A779374",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E70C6D8D-C9C3-4D92-8DFC-71F59E068295",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "691FA41B-C2CE-413F-ABB1-0B22CB322807",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717D895C-E64D-4E0E-9F4A-9B191E6388B6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4_mini:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "721FDF15-999F-42C1-90C2-4708C6DB98B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7060E1BD-9FFF-4D74-A2EE-20ABB447EA23",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9C84354-75A3-4E55-A2D0-C0783AF36B37",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s7:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F54653E7-88CD-4AA3-A2CD-BA0B116955F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "On Samsung Galaxy S4 through S7 devices, the \"omacp\" app ignores security information embedded in the OMACP messages resulting in remote unsolicited WAP Push SMS messages being accepted, parsed, and handled by the device, leading to unauthorized configuration changes, a subset of SVE-2016-6542.",
      },
      {
         lang: "es",
         value: "En dispositivos Samsung Galaxy S4 hasta la versión S7, la aplicación \"omacp\" ignora información de seguridad incrustada en los mensajes OMACP resultando en que mensajes WAP Push SMS remotos no solicitados son aceptados, analizados y manejados por el dispositivo, lo que lleva a cambios en la configuración no autorizados, un subconjunto de SVE-2016-6542.",
      },
   ],
   id: "CVE-2016-7991",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:C/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-10-31T10:59:08.147",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94088",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94088",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-388",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-10-31 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
On Samsung Galaxy S4 through S7 devices, an integer overflow condition exists within libomacp.so when parsing OMACP messages (within WAP Push SMS messages) leading to a heap corruption that can result in Denial of Service and potentially remote code execution, a subset of SVE-2016-6542.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "49413FF7-7910-4F74-B106-C3170612CB2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2467F65-A3B7-4E45-A9A5-E5A6EFD99D7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8882E50-7C49-4A99-91F2-DF979CF8BB2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "98C32982-095C-4628-9958-118A3D3A9CAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FC0FCEA-0B3D-43C1-AB62-4F9C880B4CA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC75ED04-B8C7-4CC0-AC64-AE2D9E0CDF5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC13D3EE-CC89-4883-8E3D-3FE25FB8CF42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3CEEA22-63B4-4702-A400-01349DF0EC1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C4E6353-B77A-464F-B7DE-932704003B33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "77125688-2CCA-4990-ABB2-551D47CB0CDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9915371-C730-41F7-B86E-7E4DE0DF5385",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7A8EC00-266C-409B-AD43-18E8DFCD6FE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B846C63A-7261-481E-B4A4-0D8C79E0D8A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1D94CDD-DE7B-444E-A3AE-AE9C9A779374",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E70C6D8D-C9C3-4D92-8DFC-71F59E068295",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "691FA41B-C2CE-413F-ABB1-0B22CB322807",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717D895C-E64D-4E0E-9F4A-9B191E6388B6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4_mini:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "721FDF15-999F-42C1-90C2-4708C6DB98B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7060E1BD-9FFF-4D74-A2EE-20ABB447EA23",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9C84354-75A3-4E55-A2D0-C0783AF36B37",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s7:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F54653E7-88CD-4AA3-A2CD-BA0B116955F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "On Samsung Galaxy S4 through S7 devices, an integer overflow condition exists within libomacp.so when parsing OMACP messages (within WAP Push SMS messages) leading to a heap corruption that can result in Denial of Service and potentially remote code execution, a subset of SVE-2016-6542.",
      },
      {
         lang: "es",
         value: "En dispositivos Samsung Galaxy S4 hasta la versión S7, existe una condición de desbordamiento de entero dentro de libomacp.so al analizar mensajes OMACP (dentro de mensajes WAP Push SMS) que conducen a una corrupción de la pila que puede resultar en Denial of Service y potencial ejecución remota de código, un subconjunto de SVE-2016-6542.",
      },
   ],
   id: "CVE-2016-7990",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-10-31T10:59:06.597",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94086",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94086",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
            {
               lang: "en",
               value: "CWE-388",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-08-24 20:29
Modified
2024-11-21 02:26
Summary
The samsung_extdisp driver in the Samsung S4 (GT-I9500) I9500XXUEMK8 kernel 3.4 and earlier allows attackers to potentially obtain sensitive information.
Impacted products
Vendor Product Version
samsung galaxy_s4_firmware i9500xxuemk8
samsung galaxy_s4 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s4_firmware:i9500xxuemk8:*:*:*:*:*:*:*",
                     matchCriteriaId: "77BFFEC0-BC4E-4D09-8CE3-832E92F989F5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717D895C-E64D-4E0E-9F4A-9B191E6388B6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The samsung_extdisp driver in the Samsung S4 (GT-I9500) I9500XXUEMK8 kernel 3.4 and earlier allows attackers to potentially obtain sensitive information.",
      },
      {
         lang: "es",
         value: "El controlador samsung_extdisp en el Samsung S4 (GT-I9500) I9500XXUEMK8 kernel 3.4 y anteriores permite que atacantes puedan obtener información sensible.",
      },
   ],
   id: "CVE-2015-1800",
   lastModified: "2024-11-21T02:26:10.327",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-08-24T20:29:00.237",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/09/21/13",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/09/21/4",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/09/22/18",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/76807",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/09/21/13",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/09/21/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/09/22/18",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/76807",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-08-24 20:29
Modified
2024-11-21 02:26
Severity ?
Summary
The samsung_extdisp driver in the Samsung S4 (GT-I9500) I9500XXUEMK8 kernel 3.4 and earlier allows attackers to cause a denial of service (memory corruption) or gain privileges.
Impacted products
Vendor Product Version
samsung galaxy_s4_firmware i9500xxuemk8
samsung galaxy_s4 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s4_firmware:i9500xxuemk8:*:*:*:*:*:*:*",
                     matchCriteriaId: "77BFFEC0-BC4E-4D09-8CE3-832E92F989F5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717D895C-E64D-4E0E-9F4A-9B191E6388B6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The samsung_extdisp driver in the Samsung S4 (GT-I9500) I9500XXUEMK8 kernel 3.4 and earlier allows attackers to cause a denial of service (memory corruption) or gain privileges.",
      },
      {
         lang: "es",
         value: "El controlador samsung_extdisp en el Samsung S4 (GT-I9500) I9500XXUEMK8 kernel 3.4 y anteriores permite que atacantes provoquen una denegación de servicio (corrupción de memoria) u obtengan privilegios.",
      },
   ],
   id: "CVE-2015-1801",
   lastModified: "2024-11-21T02:26:10.437",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-08-24T20:29:00.267",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/09/21/13",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/09/21/4",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/76807",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/09/21/13",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/09/21/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/76807",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-10-31 10:59
Modified
2025-04-12 10:46
Summary
On Samsung Galaxy S4 through S7 devices, a malformed OTA WAP PUSH SMS containing an OMACP message sent remotely triggers an unhandled ArrayIndexOutOfBoundsException in Samsung's implementation of the WifiServiceImpl class within wifi-service.jar. This causes the Android runtime to continually crash, rendering the device unusable until a factory reset is performed, a subset of SVE-2016-6542.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "49413FF7-7910-4F74-B106-C3170612CB2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2467F65-A3B7-4E45-A9A5-E5A6EFD99D7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8882E50-7C49-4A99-91F2-DF979CF8BB2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "98C32982-095C-4628-9958-118A3D3A9CAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FC0FCEA-0B3D-43C1-AB62-4F9C880B4CA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC75ED04-B8C7-4CC0-AC64-AE2D9E0CDF5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC13D3EE-CC89-4883-8E3D-3FE25FB8CF42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3CEEA22-63B4-4702-A400-01349DF0EC1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C4E6353-B77A-464F-B7DE-932704003B33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "77125688-2CCA-4990-ABB2-551D47CB0CDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9915371-C730-41F7-B86E-7E4DE0DF5385",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7A8EC00-266C-409B-AD43-18E8DFCD6FE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B846C63A-7261-481E-B4A4-0D8C79E0D8A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1D94CDD-DE7B-444E-A3AE-AE9C9A779374",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E70C6D8D-C9C3-4D92-8DFC-71F59E068295",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "691FA41B-C2CE-413F-ABB1-0B22CB322807",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717D895C-E64D-4E0E-9F4A-9B191E6388B6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4_mini:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "721FDF15-999F-42C1-90C2-4708C6DB98B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7060E1BD-9FFF-4D74-A2EE-20ABB447EA23",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9C84354-75A3-4E55-A2D0-C0783AF36B37",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s7:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F54653E7-88CD-4AA3-A2CD-BA0B116955F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "On Samsung Galaxy S4 through S7 devices, a malformed OTA WAP PUSH SMS containing an OMACP message sent remotely triggers an unhandled ArrayIndexOutOfBoundsException in Samsung's implementation of the WifiServiceImpl class within wifi-service.jar. This causes the Android runtime to continually crash, rendering the device unusable until a factory reset is performed, a subset of SVE-2016-6542.",
      },
      {
         lang: "es",
         value: "En dispositivos Samsung Galaxy S4 hasta la versión S7, un OTA WAP PUSH SMS mal formado que contiene un mensaje enviado OMACP desencadena remotamente un ArrayIndexOutOfBoundsException no controlado en la implementación de Samsung de la clase WifiServiceImpl dentro de wifi-service.jar. Esto provoca que el tiempo de ejecución de Android se caiga continuamente, haciendo al dispositivo inutilizable hasta que se realiza un restablecimiento de fábrica, un subconjunto de SVE-2016-6542.",
      },
   ],
   id: "CVE-2016-7989",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-10-31T10:59:05.193",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94082",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/94082",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-254",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-06-19 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
The SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices relies on an HTTP connection to the skslm.swiftkey.net server, which allows man-in-the-middle attackers to write to language-pack files by modifying an HTTP response. NOTE: CVE-2015-4640 exploitation can be combined with CVE-2015-4641 exploitation for man-in-the-middle code execution.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:swiftkey:swiftkey_sdk:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "88F176E3-EC85-4B8C-B5DF-8EF79949F24E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2AC272-BB5F-4817-959D-2A4ECF1626E2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4_mini:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B11D6B24-F216-47CF-9614-F27940CBD091",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s5:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "41DE2B05-3057-4F9F-A33D-6A01B4E19E65",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s6:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "55A63E34-ACAD-4577-9965-02E294955906",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices relies on an HTTP connection to the skslm.swiftkey.net server, which allows man-in-the-middle attackers to write to language-pack files by modifying an HTTP response.  NOTE: CVE-2015-4640 exploitation can be combined with CVE-2015-4641 exploitation for man-in-the-middle code execution.",
      },
      {
         lang: "es",
         value: "La implementación de la actualización del paquete de lenguas SwiftKey en los dispositivos Samsung Galaxy S4, S4 Mini, S5, y S6 depende de una conexión HTTP al servidor skslm.swiftkey.net, lo que permite a atacantes man-in-the-middle escribir en ficheros del paquete de lenguas mediante la modificación de una respuesta HTTP. NOTA: La explotación de CVE-2015-4640 puede combinarse con la explotación de CVE-2015-4641 para la ejecución de código man-in-the-middle.",
      },
   ],
   id: "CVE-2015-4640",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.9,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:A/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 5.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-06-19T14:59:01.347",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/155412",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/75347",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "https://github.com/nowsecure/samsung-ime-rce-poc/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "https://www.nowsecure.com/keyboard-vulnerability/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/155412",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/75347",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "https://github.com/nowsecure/samsung-ime-rce-poc/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "https://www.nowsecure.com/keyboard-vulnerability/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-254",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-13 16:59
Modified
2024-11-21 02:51
Summary
Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices allow attackers to send AT commands by plugging the device into a Linux host, aka SVE-2016-5301.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s6_firmware:g920fxxu2coh2:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F1AFDE-A42D-4B25-8081-1BBA0319A138",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9C84354-75A3-4E55-A2D0-C0783AF36B37",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_note_3_firmware:n9005xxugbob6:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1A9C49-9E9E-4BD8-9AF2-3C1C281F82C5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_note_3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B148CE20-A498-4F1E-9C2D-C38F9F15292D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s4_mini_firmware:i9192xxubnb1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4957EA2-52E5-430F-8C88-342F42210296",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4_mini:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "721FDF15-999F-42C1-90C2-4708C6DB98B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s4_mini_lte_firmware:i9195xxucol1:*:*:*:*:*:*:*",
                     matchCriteriaId: "086D5334-9867-479D-8EE6-974794850C6C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4_mini_lte:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23C6FF67-C53E-4AAF-A3EF-2FCC448F0E6E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s4_firmware:i9505xxuhoj2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E2BC548-BCA0-4DAF-BA14-B8B135159E0F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717D895C-E64D-4E0E-9F4A-9B191E6388B6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices allow attackers to send AT commands by plugging the device into a Linux host, aka SVE-2016-5301.",
      },
      {
         lang: "es",
         value: "Samsung en los dispositivos SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), y GT-I9505 build I9505XXUHOJ2 (Galaxy S4) permiten a los atacantes enviar comandos AT conectando el dispositivo a un host Linux, también conocido como SVE-2016-5301.",
      },
   ],
   id: "CVE-2016-4031",
   lastModified: "2024-11-21T02:51:12.210",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: true,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "PHYSICAL",
               availabilityImpact: "HIGH",
               baseScore: 6.8,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 0.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-13T16:59:01.207",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/97703",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/97703",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-284",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-13 16:59
Modified
2024-11-21 02:51
Summary
Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices have unintended availability of the modem in USB configuration number 2 within the secure lockscreen state, allowing an attacker to make phone calls, send text messages, or issue commands, aka SVE-2016-5301.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s6_firmware:g920fxxu2coh2:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F1AFDE-A42D-4B25-8081-1BBA0319A138",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9C84354-75A3-4E55-A2D0-C0783AF36B37",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_note_3_firmware:n9005xxugbob6:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1A9C49-9E9E-4BD8-9AF2-3C1C281F82C5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_note_3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B148CE20-A498-4F1E-9C2D-C38F9F15292D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s4_mini_firmware:i9192xxubnb1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4957EA2-52E5-430F-8C88-342F42210296",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4_mini:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "721FDF15-999F-42C1-90C2-4708C6DB98B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s4_mini_lte_firmware:i9195xxucol1:*:*:*:*:*:*:*",
                     matchCriteriaId: "086D5334-9867-479D-8EE6-974794850C6C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4_mini_lte:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23C6FF67-C53E-4AAF-A3EF-2FCC448F0E6E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s4_firmware:i9505xxuhoj2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E2BC548-BCA0-4DAF-BA14-B8B135159E0F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717D895C-E64D-4E0E-9F4A-9B191E6388B6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices have unintended availability of the modem in USB configuration number 2 within the secure lockscreen state, allowing an attacker to make phone calls, send text messages, or issue commands, aka SVE-2016-5301.",
      },
      {
         lang: "es",
         value: "Samsung en dispositivos SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), y GT-I9505 build I9505XXUHOJ2 (Galaxy S4) tienen disponibilidad no deseada del módem en el número de configuración USB 2 dentro del estado de caída seguro, lo que permite a un atacante realizar llamadas telefónicas, enviar mensajes de texto o emitir comandos, también conocido como SVE-2016-5301.",
      },
   ],
   id: "CVE-2016-4030",
   lastModified: "2024-11-21T02:51:12.043",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "PHYSICAL",
               availabilityImpact: "HIGH",
               baseScore: 6.8,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 0.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-13T16:59:01.177",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/97701",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/97701",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0004",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-284",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-27 17:15
Modified
2024-11-21 01:56
Summary
Samsung Galaxy S3/S4 exposes an unprotected component allowing arbitrary SMS text messages without requesting permission.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E17ACF33-BA4B-4FD4-811F-4AD860C016E7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A294254-1687-4340-BF07-06373FBFC072",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:samsung:galaxy_s4_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5612A23E-43B3-4B13-89C1-6178C1737DAB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "717D895C-E64D-4E0E-9F4A-9B191E6388B6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Samsung Galaxy S3/S4 exposes an unprotected component allowing arbitrary SMS text messages without requesting permission.",
      },
      {
         lang: "es",
         value: "Samsung Galaxy S3/S4 expone un componente desprotegido que permite mensajes de texto SMS arbitrarios sin solicitar permiso",
      },
   ],
   id: "CVE-2013-4763",
   lastModified: "2024-11-21T01:56:20.417",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "PHYSICAL",
               availabilityImpact: "NONE",
               baseScore: 4.6,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-27T17:15:15.297",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
         ],
         url: "http://archives.neohapsis.com/archives/bugtraq/2013-07/0108.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://www.securityfocus.com/bid/61280",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
         ],
         url: "http://archives.neohapsis.com/archives/bugtraq/2013-07/0108.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://www.securityfocus.com/bid/61280",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-276",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}