410
VMScore

CVE-2016-4030

Published: 13/04/2017 Updated: 25/04/2017
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.8 | Impact Score: 5.9 | Exploitability Score: 0.9
VMScore: 410
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices have unintended availability of the modem in USB configuration number 2 within the secure lockscreen state, allowing an malicious user to make phone calls, send text messages, or issue commands, aka SVE-2016-5301.

Vulnerable Product Search on Vulmon Subscribe to Product

samsung galaxy_s6_firmware g920fxxu2coh2

samsung galaxy_note_3_firmware n9005xxugbob6

samsung galaxy_s4_mini_firmware i9192xxubnb1

samsung galaxy_s4_mini_lte_firmware i9195xxucol1

samsung galaxy_s4_firmware i9505xxuhoj2

Github Repositories

Tool to expose and interact with the AT modem om Samsung Galaxy devices

galaxy-at-tool Tool to expose the AT modem on Samsung Galaxy devices and interact with it It works over USB connections in MTP mode with factory settings Requirements This script depends on libusb and pyserial, these can be installed with: pip install pyusb pyserial Usage: python galaxy_at_toolpy By default, the script dumps the following information Network identity IMSI,

SM-A217F (carrier unlocked) AT Commands Enable 3GPP in developer options However, it was discovered that an attacker can still access the modem by switching to a secondary USB configuration even when both USB tethering and USB debugging (ie ADB) are disabled and when the device is locked Samsung devices exposes MTP as USB configuration 1 and CDC ACM modem (for AT commands)

Samsung modem commands over USB serial connection and secret dialer codes extracted from system packages

SM-A217F (carrier unlocked) AT Commands Enable 3GPP in developer options However, it was discovered that an attacker can still access the modem by switching to a secondary USB configuration even when both USB tethering and USB debugging (ie ADB) are disabled and when the device is locked Samsung devices exposes MTP as USB configuration 1 and CDC ACM modem (for AT commands)