First published: Thu Sep 12 2019(Updated: )
Some Samsung devices include the SIMalliance Toolbox Browser (aka S@T Browser) on the UICC, which might allow remote attackers to retrieve location and IMEI information, or retrieve other data or execute certain commands, via SIM Toolkit (STK) instructions in an SMS message, aka Simjacker.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SIMalliance Toolbox Browser | ||
All of | ||
Samsung Firmware | ||
Samsung Mobile | ||
Samsung Firmware | ||
Samsung Mobile | ||
All of | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16256 is considered a high-severity vulnerability as it allows remote attackers to potentially access sensitive information.
To mitigate CVE-2019-16256, users should update their Samsung devices to the latest firmware version provided by the manufacturer.
CVE-2019-16256 affects Samsung devices that include the SIMalliance Toolbox Browser on the UICC.
CVE-2019-16256 allows attackers to retrieve location, IMEI information, and execute certain commands through SIM Toolkit instructions.
While the primary fix is to update the firmware, users can also disable SIM Toolkit services if possible to reduce risk until a patch is applied.