First published: Mon Dec 05 2016(Updated: )
An elevation of privilege vulnerability in Wi-Fi could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0. Android ID: A-31856351.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =5.0 | |
Android | =5.0.1 | |
Android | =5.0.2 | |
Android | =5.1 | |
Android | =5.1.0 | |
Android | =5.1.1 | |
Android | =6.0 | |
Android | =6.0.1 | |
Android | =7.0 | |
Android | ||
=5.0 | ||
=5.0.1 | ||
=5.0.2 | ||
=5.1 | ||
=5.1.0 | ||
=5.1.1 | ||
=6.0 | ||
=6.0.1 | ||
=7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6772 is rated as Moderate because it requires compromising a privileged process for exploitation.
To mitigate CVE-2016-6772, update your Android device to a patched version provided by Google.
CVE-2016-6772 affects Android versions 5.0, 5.0.1, 5.0.2, 5.1, 5.1.0, 5.1.1, 6.0, 6.0.1, and 7.0.
CVE-2016-6772 is an elevation of privilege vulnerability in the Wi-Fi component of Android.
The vendor for CVE-2016-6772 is Google, as it pertains to the Android operating system.