CVE-2016-8399
low-risk
Published 2017-01-12
An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.
Do I need to act?
-
0.25% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.0/10
High
LOCAL
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (14)
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0817.html
Third Party Advisory
http://www.securityfocus.com/bid/94708
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:0869
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2930
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2931
Vendor Advisory
https://source.android.com/security/bulletin/2016-12-01.html
Third Party Advisory
https://support.f5.com/csp/article/K23030550?utm_source=f5support&%3Butm_medi...
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0817.html
Third Party Advisory
http://www.securityfocus.com/bid/94708
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:0869
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2930
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2931
Vendor Advisory
https://source.android.com/security/bulletin/2016-12-01.html
Third Party Advisory
https://support.f5.com/csp/article/K23030550?utm_source=f5support&%3Butm_medi...
24
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal