PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-8420 Linux CVE debrief

CVE-2016-8420 is a high-severity elevation-of-privilege flaw in Qualcomm Wi‑Fi driver code that can let a local malicious app execute arbitrary code in kernel context. NVD lists affected Android builds up to 7.1.1 and Linux kernels 3.10 and 3.18, and the Android vendor bulletin is the primary patch reference in the supplied corpus.

Vendor
Linux
Product
CVE-2016-8420
CVSS
HIGH 7
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-08
Original CVE updated
2026-05-13
Advisory published
2017-02-08
Advisory updated
2026-05-13

Who should care

Android OEMs, kernel integrators, mobile fleet defenders, and teams supporting devices that include Qualcomm Wi‑Fi driver code on Android 7.1.1 and earlier or Linux kernels 3.10/3.18.

Technical summary

The CVE description says exploitation can lead to arbitrary code execution in kernel context from a local malicious application, and notes that it first requires compromising a privileged process. NVD assigns CVSS 3.0 AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating local access, user interaction, and high impact. NVD’s affected CPEs include Android up to 7.1.1 and Linux kernel 3.10 and 3.18.

Defensive priority

High

Recommended defensive actions

  • Apply the Android Security Bulletin 2017-02-01 patches and corresponding vendor/kernel updates.
  • Verify device builds against NVD’s affected CPEs: Android 7.1.1 and earlier, and Linux kernels 3.10 and 3.18.
  • Prioritize patching long-lived mobile fleets and embedded devices that ship Qualcomm Wi‑Fi driver code.
  • Reduce local attack surface where possible by limiting untrusted app installation until patched.

Evidence notes

Based on the supplied NVD CVE record and the Android Security Bulletin 2017-02-01 reference. The corpus shows CVSS 3.0 AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H, affected Android up to 7.1.1 and Linux kernel 3.10/3.18 CPEs, and CWE-264. The CVE description names a Qualcomm Wi‑Fi driver elevation-of-privilege issue. Source data contains mixed vendor/product labels, so the affected-platform summary follows the explicit CPEs and vendor advisory.

Official resources

Published by NVD on 2017-02-08; the Android vendor advisory referenced in the corpus is dated 2017-02-01. NVD metadata was last modified on 2026-05-13, which reflects record maintenance rather than the vulnerability’s issue date.