First published: Mon Nov 07 2016(Updated: )
An information disclosure vulnerability in the download manager in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-11-01, and 7.0 before 2016-11-01 could enable a local malicious application to bypass operating system protections that isolate application data from other applications. This issue is rated as High because it could be used to gain access to data that the application does not have access to. Android ID: A-30537115.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | >=5.0<5.0.2 | |
Google Android | >=5.1<5.1.1 | |
Google Android | >=6.0<=6.0.1 | |
Google Android | =7.0 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6710 has been classified as a moderate severity vulnerability.
To mitigate CVE-2016-6710, users should update their Android devices to the latest version or install the security patch released on November 1, 2016.
CVE-2016-6710 can lead to the exposure of app data, allowing local malicious applications to bypass application isolation.
CVE-2016-6710 affects Android versions 5.0.x to 5.0.2, 5.1.x to 5.1.1, versions 6.x before 6.0.1, and version 7.0 before November 1, 2016.
Google is responsible for addressing CVE-2016-6710 through their regular Android security updates.