CVE-2016-10456

9.8 CRITICAL

📋 TL;DR

This vulnerability allows arbitrary command execution as root/system user on affected Qualcomm Snapdragon devices running Android. An attacker can execute commands up to 15 characters by providing an invalid interface name to the radish utility. Affects Android devices with Qualcomm chipsets before the April 2018 security patch.

💻 Affected Systems

Products:
  • Qualcomm Snapdragon Mobile and Snapdragon Wear chipsets: MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, SDX20
Versions: Android versions before April 5, 2018 security patch level
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Requires radish utility to be present and executable on the device. Most affected devices are mobile phones and wearables.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise with root privileges, allowing installation of persistent malware, data theft, and complete system control.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive data and system resources.

🟢

If Mitigated

Limited impact if device is fully patched and has proper application sandboxing in place.

🌐 Internet-Facing: LOW - Requires local access to device, not directly exploitable over network.
🏢 Internal Only: HIGH - Malicious apps or users with physical access can exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access to device and ability to execute radish with malicious parameters. Could be exploited by malicious apps or users with shell access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level April 5, 2018 or later

Vendor Advisory: https://source.android.com/security/bulletin/2018-04-01

Restart Required: Yes

Instructions:

1. Check for Android system updates in device settings. 2. Apply the April 2018 or later security patch. 3. Reboot device after update completes. 4. Verify patch level in Settings > About phone > Android security patch level.

🔧 Temporary Workarounds

Remove radish executable

android

Remove or restrict execution permissions for the radish binary if present on device

adb shell rm /system/bin/radish
adb shell chmod 000 /system/bin/radish

Restrict shell access

android

🧯 If You Can't Patch

  • Isolate affected devices from sensitive networks and data
  • Implement strict application whitelisting to prevent malicious app installation

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone. If date is before April 2018, device is vulnerable. Also check if radish binary exists: adb shell ls -la /system/bin/radish

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows April 2018 or later. Test radish execution with invalid interface name should fail.

📡 Detection & Monitoring

Log Indicators:

  • Unusual radish process execution
  • Failed radish commands with invalid interface names
  • Unexpected system command execution from user processes

Network Indicators:

  • None - local exploitation only

SIEM Query:

process_name:"radish" AND (command_line:"*invalid*" OR command_line:"*interface*" OR command_line_length<16)

🔗 References

📤 Share & Export