Select Page

Download Install G955FXXU2CRF7 June 2018 Security for Galaxy S8+

Download Install G955FXXU2CRF7 June 2018 Security for Galaxy S8+

Now G955FXXU2CRF7 Android 8.0.0 Oreo Official Firmware for Samsung Galaxy  S8+ SM-G955F is available and you can manually download it from Yes Android Website if you didn't receive it via OTA.

Also you will find here a step-by-step tutorial to help you installing/Flashing the new G955FXXU2CRF7 Firmware manually through Odin Flashing tool.

Samsung is rolling out the June, 2018 Security Patch update for the Galaxy S8+ SM-G955F which will update the Galaxy  S8+ Software to the new PDA version G955FXXU2CRF7 which based on Android Oreo 8.0.0. Didn't get it yet? No Problem, I will help you.

On this page you will be able to download the latest firmware update G955FXXU2CRF7 for the Samsung Galaxy S8+ SM-G955F.

G955FXXU2CRF7 Firmware June, 2018 Security Update quick overview

Product Code for this firmware is XEO and it’s from Country/ Carrier Poland. The PDA Version of this Firmware is G955FXXU2CRF7 and CSC is G955FOXM2CRF7. The Android Version is 8.0.0 Oreo. The changelist for this firmware is 13760092, build date is 14.06.2018 and the Security patch level date is 01.06.2018.

Note: We did our best to make our installation guide easy to use and understandable, but in any situation we are NOT responsible for any brick or damages that may cause on your phone. Flashing ROM and installation steps at your own risk.

How to install G955FXXU2CRF7 June, 2018 Security Update via Official Methods?

Via Samsung SmartSwitch/Kies:

  • Run Kies/ SmartSwitch on your computer.
  • Connect your Samsung Galaxy Phone to the USB port in your Computer via USB data transfer cable.
  • Wait for your device to appear on Kies/SmartSwitch.
  • Click on the device name (e.g SM-G955F).
  • Under the “Firmware Information” tab, if there are any updates available, you will get the message ‘New Firmware is available‘. Press the ‘Firmware Upgrade‘ button.

Via OTA (Over The Air):

  • Connect your phone to the Internet through a Wi-Fi network.
  • Go to Settings> More> About Phone> Software Updates and click on ‘Check for updates‘.
  • If there any updates you will get the message “New Firmware Update Available” click download.
  • After downloading click install to start the firmware update installation process.

Below, you will find the full details about Galaxy S8+ Firmware update that released for model SM-G955F.

Android Oreo 8.0.0 G955FXXU2CRF7 Firmware Full Details

Model NameSAMSUNG Galaxy S8+
Model NumberSM-G955F
Country/ CarrierPoland
Region CodeXEO
Android VersionAndroid 8.0.0 Oreo
Build Date14.06.2018
Security Patch Level


Download Stock Firmware for Galaxy S8+ SM-G955F

Download Page1Download Page2

Note: Please note that you can't download the files over 2GB in the Free membership, you will have to upgrade to the premium membership. We are sorry for that but till this moment we can't find any other free solution better than this.

More Samsung SM-G955F Firmware Updates

Samsung Galaxy S8+ Review Video

How to Flash the Firmware Update With Odin Flashing Tool?

Brief instructions about Firmware Flashing

– Extract (unzip) the firmware file that you have downloaded.
– Download Odin Flashing Tool.
– Extract Odin ZIP file.
– Open Odin Flashing Tool.
– Reboot your Phone in Download Mode (press and hold Home + Power + Volume Down buttons).
– Connect your phone to the PC and wait until you get a blue sign in Odin.
– Add the firmware file to AP / PDA.
– Make sure re-partition option is not ticked.
– Click the start button, and wait few minutes.

Follow this tutorial for detailed and Step-by-step instructions.

Samsung June, 2018 Security Patch Update Details (SMR-JUN-2018)

Along with Google patches, Samsung Mobile provides 3 Samsung Vulnerabilities and Exposures (SVE) items described below, in order to improve our customer’s confidence on security of Samsung Mobile devices. Samsung security index (SSI), found in “Security software version”, SMR Jun-2018 Release 1 includes all patches from Samsung and Google. Some of the SVE items may not be included in this package, in case these items were already included in a previous maintenance release.

SVE-2018-11599: Buffer overflow in Trustlet

Severity: Critical
Affected Versions: N(7.X) devices with Exynos or MediaTek chipset
Reported on: March 20, 2018
Disclosure status: Privately disclosed.
Lack of boundary checking of a buffer in trustlet can lead to memory corruption.
The supplied patch prevents buffer overflow by confirming the sizes of source and destination.

SVE-2018-11600: Information disclosure in Trustlet

Severity: Moderate
Affected Versions: N(7.X)
Reported on: March 20, 2018
Disclosure status: Privately disclosed.
The vulnerability exposes the address information of Trustlet in the log.
The patch removes the problematic code.

SVE-2018-11792: Keymaster architecture vulnerability

Severity: Critical
Affected Versions: M(6.0), N(7.x), O(8.0) devices with Exynos chipset
Reported on: February 12, 2018
Disclosure status: Privately disclosed.
One of tlApi was not protected from unspecific trustlet.
The patch restricts access of tlApi in TEE via access control mechanism.

Some SVE items included in the Samsung Android Security Update cannot be disclosed at this time.

See Full details about May, 2018 Security Patch Update here.

About The Author

Ahmed Sheta

Ahmed Sheta graduated from Computer and Information Institute with MIS Bachelor's degree. He is currently working as a Freelancer SEO Copywriter and YouTuber. He also helps many small and medium Arabic & English websites as a mentor, especially in SEO Copywriting, and Technical SEO. He also trains Creators to be successful on YouTube, and trains webmasters on SEO Copywriting. Ahmed shares his knowledge about IT on his personal Blog and YouTube channel. YouTube has chosen him to be the second Top Contributor & Product Expert in the Arab world. He also a YouTube Certified with 3 Certificates.

Leave a reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.