6.6
CVSSv2

CVE-2016-0812

Published: 07/02/2016 Updated: 14/03/2016
CVSS v2 Base Score: 6.6 | Impact Score: 9.2 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.1 | Impact Score: 5.2 | Exploitability Score: 0.9
VMScore: 587
Vector: AV:L/AC:L/Au:N/C:N/I:C/A:C

Vulnerability Summary

The interceptKeyBeforeDispatching function in policy/src/com/android/internal/policy/impl/PhoneWindowManager.java in Setup Wizard in Android 5.1.x prior to 5.1.1 LMY49G and 6.0 prior to 2016-02-01 does not properly check for setup completion, which allows physically proximate malicious users to bypass the Factory Reset Protection protection mechanism and delete data via unspecified vectors, aka internal bug 25229538.

Vulnerable Product Search on Vulmon Subscribe to Product

google android 5.1

google android 6.0

google android 5.1.0

google android 6.0.1

google android 5.1.1

Recent Articles

Google plugs Android vulns
The Register • Richard Chirgwin • 02 Feb 2016

Happy days if you own a Nexus

Five "critical," four "high" severity and one merely "moderate" bug make up the menu of Android security patches, which are now available for Nexus devices and will flow through to myriad other devices when it rains up instead of down. The critical bugs relate to Broadcom and Qualcomm WiFi drivers, Android's Mediaserver, Qualcomm's performance module, and the Android debugger daemon. Here's the advisory. One by one, the critical bugs are: There's a Minikin library bug (CVE-2016-0808) that could ...