LOW · 2.9

CVE-2015-4640

The SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices relies on an HTTP connection to the skslm.swiftkey.net server, which allows man-in-the-middle attacke...

Vulnerability Description

The SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices relies on an HTTP connection to the skslm.swiftkey.net server, which allows man-in-the-middle attackers to write to language-pack files by modifying an HTTP response. NOTE: CVE-2015-4640 exploitation can be combined with CVE-2015-4641 exploitation for man-in-the-middle code execution.

CVSS Score

2.9

LOW

AV:A/AC:M/Au:N/C:N/I:P/A:N
Confidentiality
NONE
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
SwiftkeySwiftkey SdkAll versions
SamsungGalaxy S4All versions
SamsungGalaxy S4 MiniAll versions
SamsungGalaxy S5All versions
SamsungGalaxy S6All versions

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-4640?

CVE-2015-4640 is a vulnerability with a CVSS score of 2.9 (LOW). The SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices relies on an HTTP connection to the skslm.swiftkey.net server, which allows man-in-the-middle attacke...

How severe is CVE-2015-4640?

CVE-2015-4640 has been rated LOW with a CVSS base score of 2.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-4640?

Check the references section above for vendor advisories and patch information. Affected products include: Swiftkey Swiftkey Sdk, Samsung Galaxy S4, Samsung Galaxy S4 Mini, Samsung Galaxy S5, Samsung Galaxy S6.