Some Samsung devices include the SIMalliance Toolbox Browser (aka S@T Browser) on the UICC, which might allow remote attackers to retrieve location and IMEI information, or retrieve other data or execute certain commands, via SIM Toolkit (STK) instructions in an SMS message, aka Simjacker.
History

Wed, 12 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Trustedconnectivityalliance
Trustedconnectivityalliance s\@t Browser
CPEs cpe:2.3:h:samsung:samsung:-:*:*:*:*:*:*:*
cpe:2.3:o:samsung:samsung_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:trustedconnectivityalliance:s\@t_browser:-:*:*:*:*:*:*:*
Vendors & Products Samsung
Samsung samsung
Samsung samsung Firmware
Trustedconnectivityalliance
Trustedconnectivityalliance s\@t Browser

Wed, 22 Oct 2025 00:15:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Tue, 04 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2021-11-03'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-21T23:45:30.632Z

Reserved: 2019-09-12T00:00:00.000Z

Link: CVE-2019-16256

cve-icon Vulnrichment

Updated: 2024-08-05T01:10:41.635Z

cve-icon NVD

Status : Analyzed

Published: 2019-09-12T13:15:10.327

Modified: 2025-11-12T17:52:10.447

Link: CVE-2019-16256

cve-icon Redhat

No data.