Vulnerability Details : CVE-2015-4640
Potential exploit
The SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices relies on an HTTP connection to the skslm.swiftkey.net server, which allows man-in-the-middle attackers to write to language-pack files by modifying an HTTP response. NOTE: CVE-2015-4640 exploitation can be combined with CVE-2015-4641 exploitation for man-in-the-middle code execution.
Products affected by CVE-2015-4640
- cpe:2.3:a:swiftkey:swiftkey_sdk:*:*:*:*:*:*:*:*When used together with: Samsung » Galaxy S4 Mini
Exploit prediction scoring system (EPSS) score for CVE-2015-4640
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 39 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-4640
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.9
|
LOW | AV:A/AC:M/Au:N/C:N/I:P/A:N |
5.5
|
2.9
|
NIST |
CWE ids for CVE-2015-4640
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-4640
-
https://www.nowsecure.com/keyboard-vulnerability/
Samsung Keyboard Security Risk Disclosed: Over 600M+ Devices Worldwide Impacted - NowSecureExploit
-
https://github.com/nowsecure/samsung-ime-rce-poc/
GitHub - nowsecure/samsung-ime-rce-poc: Samsung Remote Code Execution as System UserExploit
-
http://www.kb.cert.org/vuls/id/155412
VU#155412 - Samsung Galaxy S phones fail to properly validate SwiftKey language pack updatesThird Party Advisory;US Government Resource
-
http://www.securityfocus.com/bid/75347
SwiftKey CVE-2015-4640 Man in The Middle Security Bypass Vulnerability
-
https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/
Remote Code Execution as System User on Samsung Phones - NowSecureExploit
-
http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/
New exploit turns Samsung Galaxy phones into remote bugging devices | Ars TechnicaExploit
Jump to