Vulnerability identifier: #VU40029
Vulnerability risk: High
CVSSv4.0: 7.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2016-6707
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
Google Android
Operating systems & Components /
Operating system
Vendor: Google
Description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
An elevation of privilege vulnerability in System Server in Android 6.x before 2016-11-01 and 7.0 before 2016-11-01 could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Android ID: A-31350622.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Google Android: 7.0
External links
https://www.securityfocus.com/bid/94164
https://bugs.chromium.org/p/project-zero/issues/detail?id=928
https://googleprojectzero.blogspot.com/2016/12/bitunmap-attacking-android-ashmem.html
https://source.android.com/security/bulletin/2016-11-01.html
https://www.exploit-db.com/exploits/40874/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.