First published: Wed Nov 06 2019(Updated: )
Samsung Galaxy S8 plus (Android version: 8.0.0, Build Number: R16NW.G955USQU5CRG3, Baseband Vendor: Qualcomm Snapdragon 835, Baseband: G955USQU5CRG3), Samsung Galaxy S3 (Android version: 4.3, Build Number: JSS15J.I9300XXUGND5, Baseband Vendor: Samsung Exynos 4412, Baseband: I9300XXUGNA8), and Samsung Galaxy Note 2 (Android version: 4.3, Build Number: JSS15J.I9300XUGND5, Baseband Vendor: Samsung Exynos 4412, Baseband: N7100DDUFND1) devices allow attackers to send AT commands over Bluetooth, resulting in several Denial of Service (DoS) attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Galaxy S8 Plus Firmware | ||
Samsung Galaxy S8 plus | ||
Samsung Galaxy S3 Firmware | ||
Samsung Galaxy S3 | ||
Samsung Galaxy Note 2 Firmware | ||
Samsung Galaxy Note 2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-16400.
Samsung Galaxy S8 Plus (Android version: 8.0.0, Build Number: R16NW.G955USQU5CRG3, Baseband Vendor: Qualcomm Snapdragon 835, Baseband: G955USQU5CRG3), Samsung Galaxy S3 (Android version: 4.3, Build Number: JSS15J.I9300XXUGND5, Baseband Vendor: Samsung Exynos 4412, Baseband: I9300XXUGNA8), and Samsung Galaxy Note 2 are affected.
The severity level of CVE-2019-16400 is medium with a severity value of 6.5.
You can find more information about CVE-2019-16400 at this link: [https://www.openconf.org/acsac2019/modules/request.php?module=oc_program&action=summary.php&id=210](https://www.openconf.org/acsac2019/modules/request.php?module=oc_program&action=summary.php&id=210)
Please refer to the official security advisory from Samsung for instructions on how to fix this vulnerability.