CVE-2016-10277
Description
An elevation of privilege vulnerability in the Motorola bootloader could enable a local malicious application to execute arbitrary code within the context of the bootloader. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-33840490.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Motorola bootloader kernel cmdline injection allows local malicious apps to gain root shell and bypass secure boot.
Vulnerability
CVE-2016-10277 is an elevation of privilege vulnerability in the Motorola Android Bootloader (ABOOT). The bootloader accepts a proprietary fastboot OEM command that allows injection of a kernel command-line parameter initrd, which forces the Linux kernel to populate the initial RAM filesystem (initramfs) from a specified physical address. This affects Android devices running Kernel-3.10 or Kernel-3.18 [1][2].
Exploitation
An attacker with physical USB access to the device (or ability to send fastboot commands) can exploit this vulnerability by: (1) using the fastboot oem config command to set the initrd parameter to a known physical address (SCRATCH_ADDR), (2) using fastboot flash to upload a malicious initramfs image to that address, and (3) rebooting the device via fastboot continue. The exploit is tethered, meaning it must be re-applied after every reboot [2].
Impact
Successful exploitation grants the attacker an unconfined root shell with SELinux set to permissive mode. The attacker can execute arbitrary code within the bootloader context, potentially achieving a persistent compromise that may require reflashing the operating system to repair the device. The impact is considered critical due to the possibility of permanent device compromise [1][2].
Mitigation
Google's Android Security Bulletin for May 2017 includes a fix for this vulnerability [1]. End users should apply the OTA update from their device manufacturer. If a patch is not yet available, users can mitigate by ensuring the bootloader is locked and avoiding untrusted USB connections. No workaround exists for devices that remain unpatched [1].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
31- osv-coords28 versionspkg:rpm/suse/cluster-network&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/cluster-network&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/drbd&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/drbd-kmp&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/drbd-kmp&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/gfs2&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/gfs2&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/ocfs2&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/ocfs2&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4
< 1.4-2.32.2.14+ 27 more
- (no CPE)range: < 1.4-2.32.2.14
- (no CPE)range: < 1.4-2.32.2.14
- (no CPE)range: < 8.4.4-0.27.2.1
- (no CPE)range: < 8.4.4-0.27.2.13
- (no CPE)range: < 8.4.4-0.27.2.13
- (no CPE)range: < 2-0.24.2.14
- (no CPE)range: < 2-0.24.2.14
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.2
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 1.6-0.28.3.4
- (no CPE)range: < 1.6-0.28.3.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- source.android.com/security/bulletin/2017-05-01nvdPatchVendor Advisory
- www.securityfocus.com/bid/98149nvdTechnical DescriptionVDB Entry
- www.exploit-db.com/exploits/42601/nvd
News mentions
0No linked articles in our index yet.