CVE-2016-6604

9.8 CRITICAL

📋 TL;DR

A NULL pointer dereference vulnerability in Samsung's fimg2d graphics driver for Android allows attackers to potentially crash devices or execute arbitrary code. This affects Samsung devices running Android 5.0/5.1 (Lollipop) and 6.0 (Marshmallow) with Exynos processors. The vulnerability could be exploited through malicious applications or other vectors.

💻 Affected Systems

Products:
  • Samsung smartphones and tablets with Exynos processors
Versions: Android 5.0, 5.1, 6.0
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with Samsung's Exynos chipsets and the fimg2d driver. Not all Samsung devices use Exynos processors.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent malware installation.

🟠

Likely Case

Device crash/reboot (kernel panic) or local privilege escalation to kernel level.

🟢

If Mitigated

Limited impact if device is patched, has SELinux restrictions, and runs only trusted applications.

🌐 Internet-Facing: MEDIUM - Requires user interaction with malicious content but could be combined with other exploits.
🏢 Internal Only: HIGH - Malicious apps or compromised processes could exploit this locally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires kernel-level knowledge and driver interaction. No public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: August 2016 security update (SMR-AUG-2016)

Vendor Advisory: http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > About phone > Software update. 2. Install August 2016 or later security patch. 3. Reboot device after installation.

🔧 Temporary Workarounds

Disable unnecessary applications

android

Reduce attack surface by disabling or uninstalling unused apps that could be vectors.

Enable Google Play Protect

android

Use built-in malware scanning to detect potentially malicious applications.

🧯 If You Can't Patch

  • Replace device with supported model receiving security updates
  • Isolate device from sensitive networks and data

🔍 How to Verify

Check if Vulnerable:

Check Android version (Settings > About phone) and security patch level. If running Android 5.0-6.0 with patch level before August 2016, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows August 2016 or later in Settings > About phone > Android security patch level.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • fimg2d driver crash messages in dmesg
  • Unexpected process termination

Network Indicators:

  • Unusual network activity from device after suspected exploitation

SIEM Query:

Device logs showing kernel crashes or unexpected reboots on Android 5.0-6.0 devices

🔗 References

📤 Share & Export