CVE-2015-6620
Description
libstagefright in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bugs 24123723 and 24445127.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A privilege escalation vulnerability in Android's libstagefright allows a crafted app to gain Signature or SignatureOrSystem access.
Vulnerability
A privilege escalation vulnerability exists in libstagefright in Android versions prior to 5.1.1 LMY48Z and 6.0 before the 2015-12-01 security patch level. The bug, referenced as internal issues 24123723 and 24445127, allows a crafted application to gain elevated privileges. The exact code path is not publicly detailed, but the issue lies in the media processing library [1].
Exploitation
An attacker requires the ability to install and run a crafted application on the target device. No additional user interaction beyond installation is necessary. The application can then trigger the vulnerability to escalate its privileges within the Android permission model. No network position or special authentication is required [1].
Impact
Successful exploitation allows the attacker to gain Signature or SignatureOrSystem level access, which effectively grants the same privileges as the system or a signed application. This enables the attacker to perform actions normally reserved for the device's trusted platform components, potentially leading to full device compromise [1].
Mitigation
The issue was addressed in the Android Security Bulletin for December 2015. Devices running Android 5.1.1 with build LMY48Z or later, and Android 6.0 with Security Patch Level of December 1, 2015 or later, include the fix. Source code patches were released to the Android Open Source Project (AOSP). Users should apply the available OTA update or flash updated firmware images. No workaround is available without the patch [1].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
4- Range: < 5.1.1 LMY48Z, < 6.0 before 2015-12-01
- Range: < 5.1.1 LMY48Z, < 6.0 before 2015-12-01
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- source.android.com/security/bulletin/2015-12-01.htmlnvdVendor Advisory
News mentions
0No linked articles in our index yet.