188
VMScore

CVE-2016-4032

Published: 13/04/2017 Updated: 25/04/2017
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 4.6 | Impact Score: 3.6 | Exploitability Score: 0.9
VMScore: 188
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices do not block AT+USBDEBUG and AT+WIFIVALUE, which allows malicious users to modify Android settings by leveraging AT access, aka SVE-2016-5301.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

samsung galaxy_s6_firmware g920fxxu2coh2

samsung galaxy_note_3_firmware n9005xxugbob6

samsung galaxy_s4_mini_firmware i9192xxubnb1

samsung galaxy_s4_mini_lte_firmware i9195xxucol1

samsung galaxy_s4_firmware i9505xxuhoj2

Github Repositories

SM-A217F (carrier unlocked) AT Commands Enable 3GPP in developer options However, it was discovered that an attacker can still access the modem by switching to a secondary USB configuration even when both USB tethering and USB debugging (ie ADB) are disabled and when the device is locked Samsung devices exposes MTP as USB configuration 1 and CDC ACM modem (for AT commands)

Samsung modem commands over USB serial connection and secret dialer codes extracted from system packages

SM-A217F (carrier unlocked) AT Commands Enable 3GPP in developer options However, it was discovered that an attacker can still access the modem by switching to a secondary USB configuration even when both USB tethering and USB debugging (ie ADB) are disabled and when the device is locked Samsung devices exposes MTP as USB configuration 1 and CDC ACM modem (for AT commands)