CVE-2016-6772

Published on: 01/12/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:12 PM UTC

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Certain versions of Android from Google contain the following vulnerability:

An elevation of privilege vulnerability in Wi-Fi could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0. Android ID: A-31856351.

  • CVE-2016-6772 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.
  • Affected Vendor/Software: Google Inc. - Android version Android-5.0.2
  • Affected Vendor/Software: Google Inc. - Android version Android-5.1.1
  • Affected Vendor/Software: Google Inc. - Android version Android-6.0
  • Affected Vendor/Software: Google Inc. - Android version Android-6.0.1
  • Affected Vendor/Software: Google Inc. - Android version Android-7.0

CVSS3 Score: 7.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 9.3 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Google Android - WifiNative::setHotlist Stack Overflow - Android dos Exploit www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 40945
Google Android Wi-Fi CVE-2016-6772 Remote Privilege Escalation Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 94701
Android Security Bulletin—December 2016 | Android Open Source Project Vendor Advisory
source.android.com
text/html
URL Logo CONFIRM source.android.com/security/bulletin/2016-12-01.html
958 - Android - Stack overflow in WifiNative::setHotlist - project-zero - Monorail bugs.chromium.org
text/html
URL Logo MISC bugs.chromium.org/p/project-zero/issues/detail?id=958

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
GoogleAndroid5.0AllAllAll
Operating
System
GoogleAndroid5.0.1AllAllAll
Operating
System
GoogleAndroid5.0.2AllAllAll
Operating
System
GoogleAndroid5.1AllAllAll
Operating
System
GoogleAndroid5.1.0AllAllAll
Operating
System
GoogleAndroid5.1.1AllAllAll
Operating
System
GoogleAndroid6.0AllAllAll
Operating
System
GoogleAndroid6.0.1AllAllAll
Operating
System
GoogleAndroid7.0AllAllAll
Operating
System
GoogleAndroid5.0AllAllAll
Operating
System
GoogleAndroid5.0.1AllAllAll
Operating
System
GoogleAndroid5.0.2AllAllAll
Operating
System
GoogleAndroid5.1AllAllAll
Operating
System
GoogleAndroid5.1.0AllAllAll
Operating
System
GoogleAndroid5.1.1AllAllAll
Operating
System
GoogleAndroid6.0AllAllAll
Operating
System
GoogleAndroid6.0.1AllAllAll
Operating
System
GoogleAndroid7.0AllAllAll
  • cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*: