Skip to main content

Multiple Vulnerabilities in Prima Wi-Fi Driver (CVE-2016-2471, CVE-2016-2473)

Release Date:

July 21, 2016

Affected Projects:

Android for MSMFirefox OS for MSMQRD Android

Advisory ID:


CVE ID(s):



CVE-2016- 2471 When ioctl SIOCSIWSCAN receives SSID length greater than the valid length 32, a write buffer overflow occurs. Vulnerability: CWE-242 Use of Inherently Dangerous Functions CVE-2016-2473 When invoking the WLAN_SET_PACKET_FILTER_PARAMS ioctl, there is no validation of the parameters passed to the iw_set_packet_filter_params function. This could lead to an information exposure. Vulnerability: CWE-20 Improper Input Validation

Access Vector: Local
Security Risk: High
Access Vector: Local

Affected Versions:

All Android releases from CAF using the following heads: KitKat, Lollipop, Marshmallow


We advise customers to apply the following patches:

Individual Patches

Note: These issues (CVE-2016-2471, CVE-2016-2473) have been published in the Android Security Bulletin—June 2016 (


This issue was reported to Google by a security researcher. Qualcomm Innovation Center, Inc. (QuIC) thanks Google for bringing this issue to QuIC's attention.


Initial revision