First published: Mon Oct 31 2016(Updated: )
On Samsung Galaxy S4 through S7 devices, the "omacp" app ignores security information embedded in the OMACP messages resulting in remote unsolicited WAP Push SMS messages being accepted, parsed, and handled by the device, leading to unauthorized configuration changes, a subset of SVE-2016-6542.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =4.2.2 | |
Android | =4.3 | |
Android | =4.3.1 | |
Android | =4.4 | |
Android | =4.4.1 | |
Android | =4.4.2 | |
Android | =4.4.3 | |
Android | =4.4.4 | |
Android | =5.0 | |
Android | =5.0.1 | |
Android | =5.0.2 | |
Android | =5.1 | |
Android | =5.1.0 | |
Android | =5.1.1 | |
Android | =6.0 | |
Android | =6.0.1 | |
Samsung Galaxy S4 | ||
Samsung Galaxy S4 mini LTE | ||
Samsung Galaxy S5 Firmware | ||
Samsung Galaxy S6 Firmware | ||
Samsung Galaxy S7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7991 is classified as a high-severity vulnerability due to its potential for unauthorized configuration changes on affected devices.
Fixing CVE-2016-7991 involves updating the affected Samsung Galaxy devices to the latest security patch provided by Samsung.
CVE-2016-7991 affects Samsung Galaxy S4, S5, S6, S7, and various versions of Android from 4.2.2 to 6.0.1.
The impact of CVE-2016-7991 includes the acceptance and handling of malicious WAP Push SMS messages leading to unauthorized changes.
Yes, CVE-2016-7991 was publicly disclosed in August 2016 as part of Samsung's security updates.