First published: Thu Apr 13 2017(Updated: )
Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices do not block AT+USBDEBUG and AT+WIFIVALUE, which allows attackers to modify Android settings by leveraging AT access, aka SVE-2016-5301.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Galaxy S6 Firmware | =g920fxxu2coh2 | |
Samsung Galaxy S6 Firmware | ||
Samsung Galaxy Note 3 firmware | =n9005xxugbob6 | |
Samsung Galaxy Note 3 firmware | ||
Samsung Galaxy S4 Mini | =i9192xxubnb1 | |
Samsung Galaxy S4 mini LTE | ||
Samsung Galaxy S4 mini LTE | =i9195xxucol1 | |
Samsung Galaxy S4 Mini | ||
Samsung Galaxy S4 Firmware | =i9505xxuhoj2 | |
Samsung Galaxy S4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4032 has a medium severity due to potential security risks it poses to affected devices.
To fix CVE-2016-4032, ensure your device is updated to the latest firmware that addresses this vulnerability.
CVE-2016-4032 affects Samsung Galaxy S6, Galaxy Note 3, Galaxy S4 Mini, and Galaxy S4 models with specific builds.
The exploit in CVE-2016-4032 allows unauthorized access to certain device settings which may compromise data security.
Yes, CVE-2016-4032 specifically concerns how certain Samsung devices handle AT+USBDEBUG commands, leading to potential vulnerabilities.