9.3
CVSSv2

CVE-2015-6639

Published: 06/01/2016 Updated: 30/05/2023
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 940
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Widevine QSEE TrustZone application in Android 5.x prior to 5.1.1 LMY49F and 6.0 prior to 2016-01-01 allows malicious users to gain privileges via a crafted application that leverages QSEECOM access, aka internal bug 24446875.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google android 6.0.1

google android 6.0

google android 5.0

google android 5.1.1

Exploits

Sources: bits-pleaseblogspotca/2016/05/qsee-privilege-escalation-vulnerabilityhtml githubcom/laginimaineb/cve-2015-6639 Qualcomm's Secure Execution Environment (QSEE) Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639) Proof of Concept: githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bi ...

Github Repositories

QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)

cve-2015-6639 QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)

πŸ”’ A compiled checklist of 300+ tips for protecting digital security and privacy in 2022

A curated checklist of tips to protect your digital security and privacy Contents Authentication Browsing the Web Email Secure Messaging Social Media Networks Mobile Phones Personal Computers Smart Home Personal Finance Human Aspect Physical Security Too long? πŸ¦’ See the TLDR version instead For a list of privacy-respecting software, check out Awesome-Privacy A

Most reported data breaches are caused by the use of weak, default or stolen passwords (according to this Verizon report). Use long, strong and unique passwords, manage them in a secure password manager, enable 2-factor authentication, keep on top of breaches and take care while logging into your accounts.

A curated checklist of tips to protect your digital security and privacy Contents Authentication Browsing the Web Email Secure Messaging Social Media Networks Mobile Phones Personal Computers Smart Home Personal Finance Human Aspect Physical Security Too long? πŸ¦’ See the TLDR version instead For a list of privacy-respecting software, check out Awesome-Privacy A

A curated checklist of tips to protect your digital security and privacy Contents Authentication Browsing the Web Email Secure Messaging Social Media Networks Mobile Phones Personal Computers Smart Home Personal Finance Human Aspect Physical Security Too long? πŸ¦’ See the TLDR version instead See Also Why Privacy & Security Matters Privacy-Respecting Soft

A curated checklist of tips to protect your digital security and privacy Contents Authentication Browsing the Web Email Secure Messaging Social Media Networks Mobile Phones Personal Computers Smart Home Personal Finance Human Aspect Physical Security Too long? πŸ¦’ See the TLDR version instead See Also Why Privacy & Security Matters Privacy-Respecting Soft

Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431

ExtractKeyMaster Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431

A compiled checklist of 300+ tips for protecting digital security and privacy for a safe web space.

A curated checklist of tips to protect your digital security and privacy Contents Authentication Browsing the Web Email Secure Messaging Social Media Networks Mobile Phones Personal Computers Smart Home Personal Finance Human Aspect Physical Security Authentication Most reported data breaches are caused by the use of weak, default or stolen passwords (according to

A curated checklist of tips to protect your digital security and privacy Contents Authentication Browsing the Web Email Secure Messaging Social Media Networks Mobile Phones Personal Computers Smart Home Personal Finance Human Aspect Physical Security Too long? πŸ¦’ See the TLDR version instead For a list of privacy-respecting software, check out Awesome-Privacy A

A curated checklist of tips to protect your digital security and privacy Contents Authentication Browsing the Web Email Secure Messaging Social Media Networks Mobile Phones Personal Computers Smart Home Personal Finance Human Aspect Physical Security Too long? πŸ¦’ See the TLDR version instead See Also Why Privacy & Security Matters Privacy-Respecting Soft

A curated checklist of tips to protect your digital security and privacy Contents Authentication Browsing the Web Email Secure Messaging Social Media Networks Mobile Phones Personal Computers Smart Home Personal Finance Human Aspect Physical Security Too long? πŸ¦’ See the TLDR version instead For a list of privacy-respecting software, check out Awesome-Privacy A

A curated checklist of tips to protect your digital security and privacy Contents Authentication Browsing the Web Email Secure Messaging Social Media Networks Mobile Phones Personal Computers Smart Home Personal Finance Human Aspect Physical Security Too long? πŸ¦’ See the TLDR version instead For a list of privacy-respecting software, check out Awesome-Privacy A

A curated checklist of tips to protect your digital security and privacy Contents Authentication Browsing the Web Email Secure Messaging Social Media Networks Mobile Phones Personal Computers Smart Home Personal Finance Human Aspect Physical Security Too long? πŸ¦’ See the TLDR version instead See Also Why Privacy & Security Matters Privacy-Respecting Soft

A curated checklist of tips to protect your digital security and privacy Contents Authentication Browsing the Web Email Secure Messaging Social Media Networks Mobile Phones Personal Computers Smart Home Personal Finance Human Aspect Physical Security Too long? πŸ¦’ See the TLDR version instead For a list of privacy-respecting software, check out Awesome-Privacy A

My stars on GitHub, grouped by language.

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents Assembly Awk Bikeshed Blade C C# C++ CSS Clojure Crystal Cython D Dart Dockerfile Elixir Gherkin Go Groovy HTML Haskell Java JavaScript Jinja Jupyter Notebook Kotlin Lua Makefile Markdown Mustache Nim Nix Nunjucks OCaml OpenSCAD Others PHP Perl PowerShell Python R Roff Ruby Rust SCSS SVG Sass Sc

A curated checklist of tips to protect your digital security and privacy Contents Authentication Browsing the Web Email Secure Messaging Social Media Networks Mobile Phones Personal Computers Smart Home Personal Finance Human Aspect Physical Security Too long? πŸ¦’ See the TLDR version instead For a list of privacy-respecting software, check out Awesome-Privacy A

A curated checklist of tips to protect your digital security and privacy Contents Authentication Browsing the Web Email Secure Messaging Social Media Networks Mobile Phones Personal Computers Smart Home Personal Finance Human Aspect Physical Security Too long? πŸ¦’ See the TLDR version instead For a list of privacy-respecting software, check out Awesome-Privacy A

Recent Articles

60 per cent of Androids exposed by new attack on mediaserver
The Register β€’ Darren Pauli β€’ 20 May 2016

Yet again, the fix would be proper vetting of code in Google Play and other app stores

Duo Security researcher Kyle Lady says attackers can compromise more than half of enterprise Android phones by chaining two operating system and chip vulnerabilities. The flaws affect scores of phones on the market from the most popular Lollipop version 5 Android system, second-placed KitKat version 4.4, and the barely-used modern Marshmallow version 6. Some 60 percent of enterprise Android phones are affected based on tests of half a million phones. Affected users can apply a January patch if o...