Some Motorola devices include the SIMalliance Toolbox Browser (aka S@T Browser) on the UICC, which might allow remote attackers to retrieve location and IMEI information, or retrieve other data or execute certain commands, via SIM Toolkit (STK) instructions in an SMS message, aka Simjacker.
References
Link | Resource |
---|---|
https://www.adaptivemobile.com/blog/simjacker-next-generation-spying-over-mobile | Exploit Third Party Advisory |
https://www.adaptivemobile.com/blog/simjacker-next-generation-spying-over-mobile | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.adaptivemobile.com/blog/simjacker-next-generation-spying-over-mobileĀ - Exploit, Third Party Advisory |
Information
Published : 2019-09-12 13:15
Updated : 2024-11-21 04:30
NVD link : CVE-2019-16257
Mitre link : CVE-2019-16257
CVE.ORG link : CVE-2019-16257
JSON object : View
Products Affected
motorola
- motorola_firmware
- motorola
CWE