410
VMScore

CVE-2016-4031

Published: 13/04/2017 Updated: 25/04/2017
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.8 | Impact Score: 5.9 | Exploitability Score: 0.9
VMScore: 410
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices allow malicious users to send AT commands by plugging the device into a Linux host, aka SVE-2016-5301.

Vulnerable Product Search on Vulmon Subscribe to Product

samsung galaxy_s6_firmware g920fxxu2coh2

samsung galaxy_note_3_firmware n9005xxugbob6

samsung galaxy_s4_mini_firmware i9192xxubnb1

samsung galaxy_s4_mini_lte_firmware i9195xxucol1

samsung galaxy_s4_firmware i9505xxuhoj2

Github Repositories

SM-A217F (carrier unlocked) AT Commands Enable 3GPP in developer options However, it was discovered that an attacker can still access the modem by switching to a secondary USB configuration even when both USB tethering and USB debugging (ie ADB) are disabled and when the device is locked Samsung devices exposes MTP as USB configuration 1 and CDC ACM modem (for AT commands)

Samsung modem commands over USB serial connection and secret dialer codes extracted from system packages

SM-A217F (carrier unlocked) AT Commands Enable 3GPP in developer options However, it was discovered that an attacker can still access the modem by switching to a secondary USB configuration even when both USB tethering and USB debugging (ie ADB) are disabled and when the device is locked Samsung devices exposes MTP as USB configuration 1 and CDC ACM modem (for AT commands)