First published: Wed Nov 06 2019(Updated: )
Samsung Galaxy S8 plus (Android version: 8.0.0, Build Number: R16NW.G955USQU5CRG3, Baseband Vendor: Qualcomm Snapdragon 835, Baseband: G955USQU5CRG3), Samsung Galaxy S3 (Android version: 4.3, Build Number: JSS15J.I9300XXUGND5, Baseband Vendor: Samsung Exynos 4412, Baseband: I9300XXUGNA8), and Samsung Galaxy Note 2 (Android version: 4.3, Build Number: JSS15J.I9300XUGND5, Baseband Vendor: Samsung Exynos 4412, Baseband: N7100DDUFND1) devices allow injection of AT+CIMI and AT+CGSN over Bluetooth, leaking sensitive information such as IMSI, IMEI, call status, call setup stage, internet service status, signal strength, current roaming status, battery level, and call held status.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Galaxy S8 Plus Firmware | ||
Samsung Galaxy S8 plus | ||
Samsung Galaxy S3 Firmware | ||
Samsung Galaxy S3 | ||
Samsung Galaxy Note 2 Firmware | ||
Samsung Galaxy Note 2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16401 is a vulnerability that affects Samsung Galaxy S8 Plus and Samsung Galaxy S3 devices.
The severity of CVE-2019-16401 is medium, with a severity value of 6.5.
Samsung Galaxy S8 Plus (with firmware) and Samsung Galaxy S3 (with firmware) are affected by CVE-2019-16401.
To fix CVE-2019-16401, you should update the firmware of your Samsung Galaxy S8 Plus or Samsung Galaxy S3 device to the latest version available.
You can find more information about CVE-2019-16401 at the following link: https://www.openconf.org/acsac2019/modules/request.php?module=oc_program&action=summary.php&id=210