PatchSiren cyber security CVE debrief
CVE-2017-0408 Google CVE debrief
CVE-2017-0408 is a high-severity remote code execution issue described in Android's security bulletin for libgdx. According to the published advisory, a specially crafted file could allow arbitrary code execution in the context of an unprivileged process.
- Vendor
- Product
- CVE-2017-0408
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-08
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-08
- Advisory updated
- 2026-05-13
Who should care
Android security teams, application maintainers that bundle or rely on libgdx, and operators of apps that parse untrusted files should care most. The published Android bulletin and NVD entry indicate this affects Android 7.1.1 and may be triggered through file handling.
Technical summary
The published description states that libgdx can be exploited with a specially crafted file to execute arbitrary code in an unprivileged process. NVD lists the affected CPE as Android 7.1.1 and assigns CVSS 3.0 vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, which indicates local attack conditions and required user interaction despite the remote code execution impact language. NVD also marks the weakness as NVD-CWE-noinfo.
Defensive priority
High. The issue is rated HIGH in the source corpus and has confidentiality, integrity, and availability impact at the CVSS high level. Prioritize patching where Android 7.1.1 or vulnerable libgdx-based applications are still in use, especially if they process untrusted files.
Recommended defensive actions
- Review whether any products or apps in your environment use libgdx or Android 7.1.1 components implicated by the advisory.
- Apply the relevant Android security bulletin fixes or vendor patches referenced for this issue.
- Reduce exposure to untrusted or specially crafted files until patched systems are confirmed.
- Validate that affected applications are updated and that old Android 7.1.1 builds are retired where possible.
- Use least privilege and limit file ingestion paths for applications that must remain in service.
Evidence notes
Primary evidence comes from the Android security bulletin linked in the NVD record and from the NVD CVE detail. The source corpus describes a crafted-file-triggered arbitrary code execution issue in libgdx, and NVD provides the affected Android 7.1.1 CPE plus the CVSS 3.0 vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. No exploit details are included here beyond the published advisory language.
Official resources
-
CVE-2017-0408 CVE record
CVE.org
-
CVE-2017-0408 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Public advisory published in the source corpus on 2017-02-08; this debrief uses that publication date and the associated official references.