Some Samsung devices include the SIMalliance Toolbox Browser (aka S@T Browser) on the UICC, which might allow remote attackers to retrieve location and IMEI information, or retrieve other data or execute certain commands, via SIM Toolkit (STK) instructions in an SMS message, aka Simjacker.
References
| Link | Resource |
|---|---|
| https://www.adaptivemobile.com/blog/simjacker-next-generation-spying-over-mobile | Exploit Third Party Advisory |
| https://www.adaptivemobile.com/blog/simjacker-next-generation-spying-over-mobile | Exploit Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-16256 | US Government Resource |
Configurations
History
12 Nov 2025, 17:52
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-16256 - US Government Resource | |
| First Time |
Trustedconnectivityalliance
Trustedconnectivityalliance s\@t Browser |
|
| CPE | cpe:2.3:h:samsung:samsung:-:*:*:*:*:*:*:* |
cpe:2.3:a:trustedconnectivityalliance:s\@t_browser:-:*:*:*:*:*:*:* |
Information
Published : 2019-09-12 13:15
Updated : 2025-11-12 17:52
NVD link : CVE-2019-16256
Mitre link : CVE-2019-16256
CVE.ORG link : CVE-2019-16256
JSON object : View
Products Affected
trustedconnectivityalliance
- s\@t_browser
CWE
