Select Page

Download A730FXXU1AQLE December 2017 Security Update | Galaxy A8 Plus

Download A730FXXU1AQLE December 2017 Security Update | Galaxy A8 Plus

Samsung is rolling out the December, 2017 Security Patch update for the Galaxy A8+ SM-A730F. Didn't get it yet? No Problem.

Here you will be able to download the firmware update A730FXXU1AQLE for the Samsung Galaxy A8+ SM-A730F. Product Code for this firmware is ALE and it’s from Country/ Carrier Ecuador (Alegro). The PDA Version of this Firmware is A730FXXU1AQLE and CSC is A730FUWB1AQLF. The Android Version is 7.1.1 Nougat. The changelist for this firmware is 12720958, build date is 21.12.2017 and the Security patch level date is 01.12.2017.

The new update (A730FXXU1AQLE) released only for Galaxy A8+ model SM-A730F, so don't try to install it on any different model even if it has the same phone name, because you may brick your phone or make it stuck in bootloop screen, so we are NOT responsible for any damages that may cause on your phone due to wrong installation and wrong use.

The Galaxy A8+ Firmware update that released for model SM-A730F brings fixes for security problems found on Android OS as well as scores of moderate-risk and high risk vulnerabilities.

Samsung Company is rolling out the new update for Galaxy A8+ SM-A730F which brings the Security Patch of December, 2017 to the device to fix some problems such as that problems mentioned previously.

The new update is based on Android Nougat 7.1.1, and it's ready now for download if you can't get it through the Official methods (OTA or Samsung Kies/ SmartSwitch), and you should install it to fix the issues found.

Android Nougat 7.1.1 A730FXXU1AQLE Firmware Details

Model Name SAMSUNG Galaxy A8+
Model Number SM-A730F
Country/ Carrier Ecuador (Alegro)
Region Code ALE
Android Version Android 7.1.1 Nougat
Changelist 12720958
Build Date 21.12.2017
Security Patch Level


Download Galaxy A8+ SM-A730F Stock Firmware Update

Download Page1 Download Page2

More Stock Firmware Updates for SM-A730F

Samsung Galaxy A8+ Review Video

How to Flash the Firmware Update With Odin Flashing Tool?

Brief instructions about Firmware Flashing

– Extract (unzip) the firmware file that you have downloaded.
– Download Odin Flashing Tool.
– Extract Odin ZIP file.
– Open Odin Flashing Tool.
– Reboot your Phone in Download Mode (press and hold Home + Power + Volume Down buttons).
– Connect your phone to the PC and wait until you get a blue sign in Odin.
– Add the firmware file to AP / PDA.
– Make sure re-partition option is not ticked.
– Click the start button, and wait few minutes.

Follow this tutorial for detailed and Step-by-step instructions.

Samsung December, 2017 Security Patch Update Details (SMR-DEC-2017)

Along with Google patches, Samsung Mobile provides 10 Samsung Vulnerabilities and Exposures (SVE) items described below, in order to improve our customer’s confidence on security of Samsung Mobile devices. Some of the SVE items may not be included in this package, in case these items were already included in a previous maintenance release.

SVE-2017-8907: Information disclosure on Samsung gpu

Severity: Moderate
Affected versions: M(6.x), N(7.x)
Reported on: April 14, 2017
Disclosure status: Privately disclosed.
kbase_context address in gpu memory node is exposed and it may result in unauthorized information disclosure.
The patch prevents kernel memory address exposure which includes kbase_context address in gpu node.

SVE-2017-10011: muic_set_reg_sel heap_overflow

Severity: Moderate
Affected versions: L(5.1), M(6.x), N(7.x)
Reported on: August 17, 2017
Disclosure status: Privately disclosed.
System can be crashed by non-existence of null pointer check; and buffer overflow vulnerability exists because the size to be copied from user space is not checked.
The patch prevents Null Pointer dereference and buffer overflow when muic register values are read.

SVE-2017-9414: panel_lpm sysfs stackOverflow issue

Severity: Moderate
Affected versions: M(6.x), N(7.x) with Qualcomm chipsets
Reported on: June 5, 2017
Disclosure status: Privately disclosed.
The size of user data is not checked and it makes buffer overflow when user data is copied into an array.
The patch prevents buffer overflow when user data is copied in lpm ctrl debug function.

SVE-2017-10598: Arbitrary Code Execution in the Samsung Bootloader

Severity: Moderate
Affected versions: L(5.x), M(6.x), N(7.x) with Exynos chipsets
Reported on: September 22, 2017
Disclosure status: Privately disclosed.
S Boot copies ramfs data to its memory without checking validation of the size making it possible to overwrite the code segment of S Boot which can result in arbitrary code execution in bootloader.
The patch prevents arbitrary code execution in bootloader by checking the limit of ramdisk size.

SVE-2017-10602: Password can be fooled by change of users HD

Severity: High
Affected versions: M(6.x), N(7.x)
Reported on: October 25, 2017
Disclosure status: Privately disclosed.
Through folding the magnetic cover during the user switching in Samsung Tablet, secure lockscreen can be bypassed. The patch prevents the device from bypassing lockscreen by adding the check routine of secure lockscreen at the moment of user switching.

Some SVE items included in the Samsung Android Security Update cannot be disclosed at this time.

See Full details about December, 2017 Security Patch Update here.

Leave a reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.