Select Page

Download J710MNUBU4BRC2 March 2018 Security Patch for Galaxy J7 (2016)

Download J710MNUBU4BRC2 March 2018 Security Patch for Galaxy J7 (2016)

Samsung is rolling out the March, 2018 Security Patch update for the Galaxy J7 (2016) SM-J710MN. Didn't get it yet? No Problem.

Here you will be able to download the firmware update J710MNUBU4BRC2 for the Samsung Galaxy J7 (2016) SM-J710MN. Product Code for this firmware is UPO and it’s from Country/ Carrier Uruguay. The PDA Version of this Firmware is J710MNUBU4BRC2 and CSC is J710MNUUB4BRC3. The Android Version is 7.0 Nougat. The changelist for this firmware is 12710487, build date is 13.03.2018 and the Security patch level date is 01.03.2018.

The new update (J710MNUBU4BRC2) released only for Galaxy J7 (2016) model SM-J710MN, so don't try to install it on any different model even if it has the same phone name, because you may brick your phone or make it stuck in bootloop screen, so we are NOT responsible for any damages that may cause on your phone due to wrong installation and wrong use.

The Galaxy J7 (2016) Firmware update that released for model SM-J710MN brings fixes for security problems found on Android OS as well as scores of moderate-risk and high risk vulnerabilities.

Samsung Company is rolling out the new update for Galaxy J7 (2016) SM-J710MN which brings the Security Patch of March, 2018 to the device to fix some problems such as that problems mentioned previously.

The new update is based on Android Nougat 7.0, and it's ready now for download if you can't get it through the Official methods (OTA or Samsung Kies/ SmartSwitch), and you should install it to fix the issues found.


Android Nougat 7.0 J710MNUBU4BRC2 Firmware Details

Model Name SAMSUNG Galaxy J7 (2016)
Model Number SM-J710MN
Country/ Carrier Uruguay
Region Code UPO
Android Version Android 7.0 Nougat
PDA J710MNUBU4BRC2
CSC J710MNUUB4BRC3
Changelist 12710487
Build Date 13.03.2018
Security Patch Level

01.03.2018


Download Galaxy J7 (2016) SM-J710MN Stock Firmware Update

Download Page1 Download Page2


More Stock Firmware Updates for SM-J710MN


Samsung Galaxy J7 (2016) Review Video

How to Flash the Firmware Update With Odin Flashing Tool?

Brief instructions about Firmware Flashing

– Extract (unzip) the firmware file that you have downloaded.
– Download Odin Flashing Tool.
– Extract Odin ZIP file.
– Open Odin Flashing Tool.
– Reboot your Phone in Download Mode (press and hold Home + Power + Volume Down buttons).
– Connect your phone to the PC and wait until you get a blue sign in Odin.
– Add the firmware file to AP / PDA.
– Make sure re-partition option is not ticked.
– Click the start button, and wait few minutes.

Follow this tutorial for detailed and Step-by-step instructions.

Samsung March, 2018 Security Patch Update Details (SMR-MAR-2018)

Along with Google patches, Samsung Mobile provides 5 Samsung Vulnerabilities and Exposures (SVE) items described below, in order to improve our customer’s confidence on security of Samsung Mobile devices. Samsung security index (SSI), found in “Security software version”, SMR Mar-2018 Release 1 includes all patches from Samsung and Google. Some of the SVE items may not be included in this package, in case these items were already included in a previous maintenance release.

SVE-2017-10993: Kernel pointer leak in USB gadget driver

Severity: Moderate
Affected Versions: L(5.x), M(6.0), N(7.x), O(8.0)
Reported on: September 15, 2017
Disclosure status: Privately disclosed.
A vulnerability in USB gadget driver allows kernel pointer leakeage.
The applied patch modified incorrect implementation of kernel logging.

SVE-2017-10897: NFC activated by magnet

Severity: Low
Affected Versions: N(7.x)
Reported on: September 14, 2017
Disclosure status: Privately disclosed.
A vulnerability allows NFC activation to bypass lockscreen when a magnet is brought close to a specific point of device.
The patch disables NFC activation in such event.

SVE-2017-10748: Accessing the Clipboard content using Edge panel

Severity: High
Affected Versions: N(7.x) (Edge)
Reported on: October 27, 2017
Disclosure status: Privately disclosed.
The clipboard edge allows attackers to access device information without user authentication for a short period after locking screen once.
The patch protects contents of clipboard using a screen lock type when turning the Clipboard Edge on.

SVE-2017-11018: Dual Messenger use permission without user agreement

Severity: Moderate
Affected Versions: N(7.x) (Dual Messenger)
Reported on: November 19, 2017
Disclosure status: Privately disclosed.
A vulnerability in DualMessenger feature allows the second app of messenger app to use the runtime permission of the first messenger app without user’s consent.
The patch fixes this vulnerability.

Some SVE items included in the Samsung Android Security Update cannot be disclosed at this time.

See Full details about March, 2018 Security Patch Update here.

Leave a reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Categories