PatchSiren cyber security CVE debrief
CVE-2017-0409 Google CVE debrief
CVE-2017-0409 is a high-severity Android libstagefright issue in which a specially crafted file can trigger arbitrary code execution in an unprivileged process. NVD records affected Android versions 6.0, 6.0.1, 7.0, 7.1.0, and 7.1.1, and the published CVSS 3.0 vector is 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Because exploitation depends on user interaction and a vulnerable content-processing path, the main defensive goal is to reduce exposure to untrusted media/files and ensure affected Android systems are updated.
- Vendor
- Product
- CVE-2017-0409
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-08
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-08
- Advisory updated
- 2026-05-13
Who should care
Android device owners, fleet administrators, OEMs, and app teams that ingest or render untrusted media or files through Android's media stack.
Technical summary
The vulnerability is described as a remote code execution issue in libstagefright, the Android media framework component. The short description says a specially crafted file may execute arbitrary code in the context of an unprivileged process. NVD's CVSS vector rates it as requiring user interaction, with high confidentiality, integrity, and availability impact. The NVD CPE list marks Android 6.0, 6.0.1, 7.0, 7.1.0, and 7.1.1 as vulnerable.
Defensive priority
High. The score is 7.8 and the impact is arbitrary code execution with high confidentiality, integrity, and availability impact, but exploitation is tempered by user interaction and the need for a vulnerable content-processing path.
Recommended defensive actions
- Apply the relevant Android security bulletin fixes for CVE-2017-0409 on all affected Android versions.
- Inventory devices and apps on Android 6.0, 6.0.1, 7.0, 7.1.0, and 7.1.1 that consume untrusted media or files.
- Limit handling of untrusted files or media on impacted devices until they are patched.
- Prioritize patching devices or applications that process attacker-supplied content from messages, downloads, or shared storage.
- Verify remediation by confirming Android security bulletin coverage in fleet management records.
Evidence notes
This debrief is grounded in the NVD record for CVE-2017-0409, which states the libstagefright remote code execution description, the CVSS 3.0 vector, and the vulnerable Android CPEs. The Android security bulletin reference dated 2017-02-01 is included in the NVD references. The CVE record was published on 2017-02-08. NVD classifies the weakness as NVD-CWE-noinfo, so the corpus does not specify a finer CWE.
Official resources
-
CVE-2017-0409 CVE record
CVE.org
-
CVE-2017-0409 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed in February 2017; the CVE record was published on 2017-02-08, and the Android security bulletin reference in the corpus is dated 2017-02-01.